Protocol Spoofing is an essential part of data communications that helps to enhance performance. This technological aspect comes as an effective solution particularly in situations when an existing protocol is not adequate characterized by high error rates and long delays. Protocol spoofing evolved in the 1980s and is used as a data compression technique to improve throughput levels and thereby increase performance. While used as a data compression technique, the protocol headers and trailers are either removed completely or cut down, and finally reconstructed at the end points.
The technique of protocol spoofing involves communication devices (modem, router), host machines, compatible remote devices and communication links. The process commences with a modem/router simulating or ‘spoofing’ a connection’s remote endpoint to that of a local host. Through using the most appropriate protocol, communication is established with a compatible remote device, which spoofs its end of the communication link.
Spoofing, in computer security, pertains to different forms of data falsification or misrepresentation. The forgery of headers to send out misleading information is a form of spoofing. While protocol spoofing generally refers to the method of enhancing performance, there are many other types of protocol spoofing that perform different functions – both advantageous and disadvantageous.
0 comments:
Post a Comment