The now world famous IP address, which is the short term for Internet Protocol address, serves many functions online and off. It is the basic communication protocol found on internal and external networks across the Internet. The IP “header” also better known as the “leading portion” of the IP address is used to identify the sending source to the destination address of the machine receiving the data.
IP address spoofing is the technique of manipulating this email address to the receiving computer to give the impression that the data being transmitted is actually coming from a totally different IP source. This method is commonly used by hackers and such during DoS attacks to prevent an end user from accurately identifying and blocking the IP address of the sender.
Network security rules are comprised in most cases of IP spoofing also to allow an intruder access to an internal network – and making it extremely troublesome for a business or other private network from not only stopping the intruder, but even being able to identify them in the first place. If a network intruder was to gain access to a internal computer on the network that was trusted, then much harm could be done to internal systems or theft of important information.
Some of the most common services that are vulnerable to the IP spoofing technique include the Remote Procedure Call service or “RPC”. Another group is what is known as the “R” services like “rsh” and “rlogin” are also susceptible. However there are a few ways to protect your computer or network from IP spoofing like using upper layer protocols over TCP and packet filtering. Packet filtering provides the best option by actually preventing an intruder from spoofing internal IP addresses, which is the most common and easy method of IP spoofing.