WAN Optimization Protocol Spoofing
Protocol Spoofing is an essential part of data communications that helps to enhance performance. This technological aspect comes as an effective solution particularly in situations when an existing protocol is not adequate characterized by high error rates and long delays. Protocol spoofing evolved in the 1980s and is used as a data compression technique to improve throughput levels and thereby increase performance. While used as a data compression technique, the protocol headers and trailers are either removed completely or cut down, and finally reconstructed at the end points.
The technique of protocol spoofing involves communication devices (modem, router), host machines, compatible remote devices and communication links. The process commences with a modem/router simulating or ‘spoofing’ a connection’s remote endpoint to that of a local host. Through using the most appropriate protocol, communication is established with a compatible remote device, which spoofs its end of the communication link.
Spoofing, in computer security, pertains to different forms of data falsification or misrepresentation. The forgery of headers to send out misleading information is a form of spoofing. While protocol spoofing generally refers to the method of enhancing performance, there are many other types of protocol spoofing that perform different functions – both advantageous and disadvantageous.
Transmission Control Protocol (TCP) Spoofing
TCP spoofing enables to reduce transmission delays and performance limitation due to higher bandwidth. The algorithm used by TCP greatly causes delays in connections during startup. TCP spoofing involves a spoofing router, which terminates the local TCP connection and interprets the TCP to protocols that have the capacity to reduce long delays across satellite links.
File Transfer Spoofing
File Transfer Protocols and Error Correction Protocols operate through computing and assigning a checksum for a data packet. The resultant number is transmitted at the data packet’s end. The end receiver re-computes the numbers and makes a comparison, which when exactly matches signifies the transmission as correct. At a signal from this end to the other, the process repeats all over for transmission of the next data packet.
RIP/SAP Spoofing
RIP and SAP are used for broadcasting network information in a periodic way. This action is done regardless of no changes in the routing or service tables. RIP/SAP spoofing method is one of intercepting the SAP and RIP broadcasts using a spoofing modem/router, and then re-broadcasting network information through its own routing table or service table.
The other types of spoofing techniques that are involved in misrepresentation of information are Address Resolution Protocol (ADP) Spoofing, Internet Protocol (IP) Address Spoofing, etc. Those protocol spoofing techniques that adversely affect the users can be controlled by using counter methods such as packet filtering, egress filtering, data authorization and other techniques.