IP-evel vulnerabilities iP addresses are provided by the source ◆ Spoofing attacks Using IP address for authentication + e.g., login with. rhosts Some features that have been exploited ◆ Fragmentation Broadcast for traffic amplification 15-411: F08 securityIP-level vulnerabilities • IP addresses are provided by the source Spoofing attacks • Using IP address for authentication e.g., login with .rhosts • Some “features” that have been exploited Fragmentation Broadcast for traffic amplification 15-411: F08 security 5