Solaris ISP Server 2.0 Administration Guide

IP Spoofing

In a spoofing attack, the intruder listening to your network traffic finds the IP address of a trusted host and sends messages indicating that the message is coming from that trusted host.