spoofing


Also found in: Dictionary, Thesaurus, Financial, Idioms, Wikipedia.
Related to spoofing: Email spoofing

spoofing

[′spüf·iŋ]
(electronics)
Deceiving or misleading the enemy in electronic operations, as by continuing transmission on a frequency after it has been effectively jammed by the enemy, using decoy radar transmitters to lead the enemy into a useless jamming effort, or transmitting radio messages containing false information for intentional interception by the enemy.

spoofing

A technique used to reduce network overhead, especially in wide area networks (WAN).

Some network protocols send frequent packets for management purposes. These can be routing updates or keep-alive messages. In a WAN this can introduce significant overhead, due to the typically smaller bandwidth of WAN connections.

Spoofing reduces the required bandwidth by having devices, such as bridges or routers, answer for the remote devices. This fools (spoofs) the LAN device into thinking the remote LAN is still connected, even though it's not. The spoofing saves the WAN bandwidth, because no packet is ever sent out on the WAN.

LAN protocols today do not yet accommodate spoofing easily.

["Network Spoofing" by Jeffrey Fritz, BYTE, December 1994, pages 221 - 224].

spoofing

(1) Faking the sending address of a transmission in order to gain illegal entry into a secure system. See email spoofing and how to spoof your techie friend.

(2) Creating fake responses or signals in order to keep a session active and prevent timeouts. For example, mainframes continuously poll their terminals. If the lines to remote terminals are temporarily suspended because there is no traffic, a local device spoofs the host with "I'm still here" responses.
References in periodicals archive ?
Caption: Researchers at Southwest Research Institute developed a GPS "spoofing" system to help automakers to defend automated vehicles against would-be hackers.
The new controls, created in partnership with the telecommunications industry and Ofcom, prevent spoofing of HMRC's most used inbound helpline numbers and are the first to be used by a government department in the UK.
Russia has also established a permanent GNSS spoofing zone hiding the location of Putin's palatial summer home near Gelendzhik on the Black Sea coast of Russia.
In the context of facial biometrics, with regard to the modalities of the data, spoofing attacks can be classified into the following three categories: (1) photograph, (2) video, and (3) 3D facial mask.
The report cards are "posted to firms at which [FINRA has] seen exceptional trading activity that may indicate potential spoofing or layering," a FINRA spokesperson told ThinkAdvisor.
"We have filed a case of email spoofing which involves use of a forged email header to make it look like a legitimate email.
"The proposed amendment shows that the UAE authorities are keen to crack down on so-called IP spoofing by imposing harsher penalties for offenders," said Dino Wilkinson, legal expert in Abu Dhabi.
In addition to the call spoofing feature, SpoofTel has implemented multiple other features over the years.
This technique is called DNS spoofing, and it is a type of hacking attack in which data is fed into a DNS name server's cache database, which makes the name server give a different IP address and thus reroutes traffic, often to the attacker's computer.
An ARP spoofing attack is an attack in which the media access control (MAC) address of a computer is masqueraded as that of another.
The company's marketing video spoofing the song depicts young girls singing about building spaceships and coding software.
THE PROBLEM of SIM spoofing has been increasing day after day that is ultimately creating harassment among customers.