spoofing


Also found in: Dictionary, Thesaurus, Financial, Idioms, Wikipedia.
Related to spoofing: Email spoofing

spoofing

[′spüf·iŋ]
(electronics)
Deceiving or misleading the enemy in electronic operations, as by continuing transmission on a frequency after it has been effectively jammed by the enemy, using decoy radar transmitters to lead the enemy into a useless jamming effort, or transmitting radio messages containing false information for intentional interception by the enemy.

spoofing

A technique used to reduce network overhead, especially in wide area networks (WAN).

Some network protocols send frequent packets for management purposes. These can be routing updates or keep-alive messages. In a WAN this can introduce significant overhead, due to the typically smaller bandwidth of WAN connections.

Spoofing reduces the required bandwidth by having devices, such as bridges or routers, answer for the remote devices. This fools (spoofs) the LAN device into thinking the remote LAN is still connected, even though it's not. The spoofing saves the WAN bandwidth, because no packet is ever sent out on the WAN.

LAN protocols today do not yet accommodate spoofing easily.

["Network Spoofing" by Jeffrey Fritz, BYTE, December 1994, pages 221 - 224].

spoofing

(1) Faking the sending address of a transmission in order to gain illegal entry into a secure system. See email spoofing.

(2) Creating fake responses or signals in order to keep a session active and prevent timeouts. For example, mainframes continuously poll their terminals. If the lines to remote terminals are temporarily suspended because there is no traffic, a local device spoofs the host with "I'm still here" responses. See how to spoof your technical friend.
References in periodicals archive ?
Spoofing an IP address involves changing the header of an internet protocol address (that allows servers to know where information is coming from) to match someone else's IP.
If you've never tried caller ID spoofing before now's your chance.
No doubt, SIM spoofing creates harassment for a customer, especially when he finds that an unknown person has taken control of his SIM and has received the incoming call despite the fact that the SIM was with him and was active.
By logging and comparing the incoming requesters' packet and the bouncing packet with random number reveals the swarm spoofing attacks (Hiding, Reflection) and dwarf spoofing attacks (Impersonation).
Business e-mail is increasingly hard-hit by spam, e-mail spoofing and phishing, as well as a continuing string of e-mail-borne viruses and worms.
As such, Message Level Enterprise not only eliminates external Phishing attacks against a company's domain name, but also from spoofing systems attempting to inject a virus, steal information, or disrupt operations within an organization by pretending to be legitimate corporate users to internal employees (e.
Additionally, through the Spoofing Prevention Act, Congress can protect the most vulnerable in our society from fraudulent scams.
The trial was widely followed by lawyers and trading firms for clarity in similar cases amid stepped-up investigations into spoofing.
The joint statement from the six organisations, published on the ICO's website, avers that they "will work together to share information and target organizations responsible for spoofing.
Coincidentally, it was Shah Rukh who raked it in spoofing some of his own iconic scenes from the past in Chennai Express .
The argument that harvesting e-mail addresses from websites or newsgroups serves to identify e-mail addresses that are "authorized" does not work since the system is designed to protect against spoofing e-mail addresses.
Today, the Senate dealt a huge blow to the criminals who use spoofing scams to deceive, intimidate, and defraud victims, especially seniors, Blunt said.