WAN Optimization Live Chat

WAN Optimization Protocol Spoofing

The technique of protocol spoofing involves communication devices (modem, router), host machines, compatible remote devices and communication links. The process commences with a modem/router simulating or ‘spoofing’ a connection’s remote endpoint to that of a local host. Through using the most appropriate protocol, communication is established with a compatible remote device, which spoofs its end of the communication link.

Spoofing, in computer security, pertains to different forms of data falsification or misrepresentation. The forgery of headers to send out misleading information is a form of spoofing. While protocol spoofing generally refers to the method of enhancing performance, there are many other types of protocol spoofing that perform different functions – both advantageous and disadvantageous.

Transmission Control Protocol (TCP) Spoofing

File Transfer Spoofing

RIP/SAP Spoofing

RIP and SAP are used for broadcasting network information in a periodic way. This action is done regardless of no changes in the routing or service tables. RIP/SAP spoofing method is one of intercepting the SAP and RIP broadcasts using a spoofing modem/router, and then re-broadcasting network information through its own routing table or service table.

The other types of spoofing techniques that are involved in misrepresentation of information are Address Resolution Protocol (ADP) Spoofing, Internet Protocol (IP) Address Spoofing, etc. Those protocol spoofing techniques that adversely affect the users can be controlled by using counter methods such as packet filtering, egress filtering, data authorization and other techniques.