IP Spoofing Suneeta Chawla Abstract: The report explains the IP-spoofing attack as complex technical attack that is made up of several components. In actuality, IP-spoofing is not the attack, but a step in the attack. The attack is actually trust-relationship exploitation. The relevant operating system and networking information is also provided to support the explanation of the attack. The study includes examination of the TCP/IP protocol suite structure, how the attack works, types of spoofing attacks, where it is used and lists down a few solutions how to defend the attack. Resources: 1. http://www.networkcommand.com/docs/ipspoof.txt 2. http://www.securityfocus.com/infocus/1674