IJCTT-International Journal of Computer Trends and Technology
Now-a-days, spoofing has occupied in many network areas. Mainly it will effect on the networks, because everyone is copying the others things and implementing then the authors can do all things very simply and they can launch this process easily. In the network each and every data in sharing has been used by cryptographic from. To stop the spoofing and to identify this they are implemented a some of the methods that they are done in step by step to overcome the problem and to detect the spoofing. They are as follows: finding the attacking situations, counting the attacks and identifying its location in the network and finding the localized attacking things in the network.