Some networked systems allow access only to hosts which have a particular Internet Protocol Address. IP spoofing involves an unauthorized entry into one of these systems. It is carried out by modifying packets of data that are sent to a network so that they look as if they have originated from a computer whose address indicates that it is allowed access into the network.