Concealment Techniques 䡲 59
computers attached to distinct but interconnected computer communication networks. Very few
assumptions are made as to the reliability of the communication protocols below the TCP layer.
TCP assumes that it can obtain a simple, potentially unreliable datagram service from the
lower level protocols. In principle, the TCP should be able to operate above a wide spectrum of
communication systems ranging from hard-wired connections to packet-switched or circuit-
switched networks [6].
Spoofi ng is the creation of TCP/IP packets using somebody else’s IP address. Routers use the
“destination IP” address to forward packets through the Internet, but ignore the “source IP”
address. at address is only used by the destin