It is clearly evident as the Internet continues to grow that it has become a prominent and dependable source for information, and tool for business-use. Our dependence on the Internet makes it critical to be able to distinguish between which types of attacks it can withstand and the types of attacks that will disable the network. Moreover, the understanding of the areas of vulnerability of the different types of networks will help find means of making it more secure in the future. With the existence of various forms of attacks against the network, network development should look ahead and strengthen the network to be able to manage itself under these intrusions. One type of these attacks is spoofing network services, where the attack will impersonate a legitimate service provider and undermine the trust-based relationship between the legitimate service provider and the machines in the system. Network services that will be involved are Address Resolution Protocol Spoofing, Routing Information Protocol Spoofing, and Dynamic Host Configuration Protocol. This paper will explain the different classifications of network attacks and describe how network service spoofing attack effect the network. Various platforms will be explored to determine how they perform under similar network service spoofing attacks.
Library of Congress Subject Headings
Computer networks--Security measures; Computer security; Internet service providers
Information Sciences and Technologies (MS)
Department, Program, or Center
Information Sciences and Technologies (GCCIS)
Lertlit, Yadasiri, "Network Disruption by Spoofing Service Attacks" (2004). Thesis. Rochester Institute of Technology. Accessed from
RIT – Main Campus