Spoofer: History

Noteworthy historical updates regarding the status of Spoofer leading up to CAIDA's stewardship of the project.


Final update: May 28, 2015

CAIDA has taken over stewardship of the Spoofer project. We have deployed a supported server instance at CAIDA and released updated client software that supports IPv6 on all platforms, and coordinates measurement with the CAIDA server.

Update: Jul 25, 2013

We've contributed some new data analysis to an Internet Society Article.

Update: Jun 30, 2013

New analyses and details available from our Summary Page.

Update: Jan 24, 2012

System experienced hardware failure. Down until Jun 7, 2012, when we moved to new hardware.

Update: Sep 16, 2009

Most recent research paper, set to appear at IMC 2009, available now in the publications section.

Update: May 8, 2009

New version 0.8 of the IP spoofer tester; now implements IPv6 spoofing on *nix platforms (win32 in works).

Update: Mar 27, 2009

New version 0.7.3 of the IP spoofer tester; see the changelog for details. Enjoy screenshots.

Update: Mar 6, 2009

New version 0.7 of the IP spoofer tester; see the changelog for details.

Update: Feb 21, 2009

Revamped web site, generated reports, summaries, etc to take advantage of new client tester. Added screenshots example section.

Update: Feb 19, 2009

New version 0.6.2 of the IP spoofer tester; see the changelog for details.

Update: Feb 12, 2009

Presented a spoofer project update at CAIDA's ISMA AIMS workshop.

Update: Jan 5, 2009

Spoofer project now integrated with CAIDA's Ark Project in order to perform distributed measurement. Thanks to kc and Young!

Update: Nov 21, 2006

New version 0.5 of the IP spoofer tester. Now supports all versions of Windows using raw ethernet. See the changelog for details.

Update: May 19, 2006

Added Slashdot Response web page. On May 2, 2006 the Spoofer Project was posted to Slashdot. Thousands of Slashdot users downloaded and the IP source spoofing client thereby contributing to our aggregate Spoofing Summary. Thanks! We sincerely appreciate the interest and feedback. We've created a Slashdot Response web page that addresses the most common questions and comments posted by Slashdot readers.

Last Modified