spoofing


Also found in: Dictionary, Thesaurus, Financial, Idioms, Wikipedia.
Related to spoofing: Email spoofing

spoofing

[′spüf·iŋ]
(electronics)
Deceiving or misleading the enemy in electronic operations, as by continuing transmission on a frequency after it has been effectively jammed by the enemy, using decoy radar transmitters to lead the enemy into a useless jamming effort, or transmitting radio messages containing false information for intentional interception by the enemy.

spoofing

A technique used to reduce network overhead, especially in wide area networks (WAN).

Some network protocols send frequent packets for management purposes. These can be routing updates or keep-alive messages. In a WAN this can introduce significant overhead, due to the typically smaller bandwidth of WAN connections.

Spoofing reduces the required bandwidth by having devices, such as bridges or routers, answer for the remote devices. This fools (spoofs) the LAN device into thinking the remote LAN is still connected, even though it's not. The spoofing saves the WAN bandwidth, because no packet is ever sent out on the WAN.

LAN protocols today do not yet accommodate spoofing easily.

["Network Spoofing" by Jeffrey Fritz, BYTE, December 1994, pages 221 - 224].

spoofing

(1) Faking the sending address of a transmission in order to gain illegal entry into a secure system. See e-mail spoofing.

(2) Creating fake responses or signals in order to keep a session active and prevent timeouts. For example, mainframes continuously poll their terminals. If the lines to remote terminals are temporarily suspended because there is no traffic, a local device spoofs the host with "I'm still here" responses. See how to spoof your technical friend.
References in periodicals archive ?
com is a provider of email authentication technology used to help eliminate spoofing, phishing, and email fraud.
The links sent out via the spoofing scam are largely product advertising, which will be phishing for information (eg credit card or personal information).
Guidelines on what constitutes 'misuse' of the spoofing technique are also being reconsidered, revised and made much clearer, with a view to introducing tougher punitive measures: monetary penalties of up to [pounds sterling]500,000 are being considered for foul-players.
Number spoofing can also make it more difficult for regulators to trace those companies responsible for making nuisance calls.
Other biometric modalities such as face, iris, voice and palm have their own vulnerabilities to spoofing attacks.
Chand, "RAAS is a very viable and strong solution for the phishing and spoofing issues that the industry continues to struggle with.
SurfControl offers the following guidelines to companies to protect users from brand spoofing threats:
SMS Firewall - protects networks from hostile spam attacks such as message content and address randomizers, spoofing, flooding, viruses and phishing using advanced rules-based filtering and anti-spoofing features
24 /PRNewswire/ -- SurfControl (LONDON: SRF) , the world's number one Web and e-mail filtering company, today warned about a large increase in a new brand spoofing spam in the past twenty-four hours that poses as MBNA Europe bank.
A lot of the Bond movies ``Powers'' is spoofing have just as much trouble sustaining interest all the way through their extended climaxes.
A close cousin of 'phishing,' pharming seeks to obtain personal information through domain spoofing," said Sara Radicati, President & CEO of The Radicati Group.
11 /PRNewswire/ -- SurfControl (LONDON: SRF) , the world's number one Web and e-mail filtering company, today warned companies to take extra security precautions against a new surge of "brand spoofing spam" that look more legitimate, may contain multiple threats and appear to be spoofing organizations such as the Federal Bureau of Investigation (FBI).