It is clearly evident as the Internet continues to grow that it has become a prominent and dependable source for information, and tool for business-use. Our dependence on the Internet makes it critical to be able to distinguish between which types of attacks it can withstand and the types of attacks that will disable the network. Moreover, the understanding of the areas of vulnerability of the different types of networks will help find means of making it more secure in the future. With the existence of various forms of attacks against the network, network development should look ahead and strengthen the network to be able to manage itself under these intrusions. One type of these attacks is spoofing network services, where the attack will impersonate a legitimate service provider and undermine the trust-based relationship between the legitimate service provider and the machines in the system. Network services that will be involved are Address Resolution Protocol Spoofing, Routing Information Protocol Spoofing, and Dynamic Host Configuration Protocol. This paper will explain the different classifications of network attacks and describe how network service spoofing attack effect the network. Various platforms will be explored to determine how they perform under similar network service spoofing attacks.

Library of Congress Subject Headings

Computer networks--Security measures; Computer security; Internet service providers

Publication Date


Document Type


Student Type


Degree Name

Information Sciences and Technologies (MS)

Department, Program, or Center

Information Sciences and Technologies (GCCIS)


Peter Lutz

Advisor/Committee Member

Jim Leone

Advisor/Committee Member

Charlie Border


Physical copy available from RIT's Wallace Library at TK5105.59 .L47 2004


RIT – Main Campus