One method of attempting to gain access to a resticted area of the network is to insert a bogus source address in the packet header to make the packet appear to come from a trusted source. This technique is called IP spoofing.
ScreenOS has two IP spoofing detection methods, both of which accomplish the same task:
determining that the packet came from a location other than that indicated in its header. The method that a Juniper Networks secrutiy device uses depends on whetehr it is operating at Layer 3 or Layer 2 in the OSI Model.
ScreenOS has two IP spoofing detection methods, both of which accomplish the same task:
determining that the packet came from a location other than that indicated in its header. The method that a Juniper Networks secrutiy device uses depends on whetehr it is operating at Layer 3 or Layer 2 in the OSI Model.
'Hacking' 카테고리의 다른 글
A successful DoS attack overwhelms its victim with such a massive barrage of false (0) | 2011.07.28 |
---|---|
Firewall DoS Attacks (0) | 2011.07.28 |
Windows Media player 11.0.5721.5145 Buffer overflow/DOS Exploit (2) | 2011.04.02 |
Antivirus and Security software coupons (0) | 2011.03.26 |
2011 Malware Trends (0) | 2011.03.26 |