1. National Institute of Standards and Technology (NIST). (2021). Glossary of Key Information Security Terms (NISTIR 7298 Rev. 4). In the entry for "Spoofing
" it is defined as "The deliberate inducement of a user or resource to take an incorrect action. [...] Faking the sending address of a transmission to gain illegal entry into a secure system." (Page 201). Retrieved from https://doi.org/10.6028/NIST.IR.7298r4
2. Kurose
J. F.
& Ross
K. W. (2017). Computer Networking: A Top-Down Approach (7th ed.). Pearson. In Chapter 8
Section 8.2.2
"Source IP Spoofing
" the text states
"The ability of a bad guy to put a false source address into a packet is known as IP spoofing." This principle of falsifying the source address is central to the concept.
3. Saltzer
J. H.
& Kaashoek
M. F. (2009). Principles of Computer System Design: An Introduction. Morgan Kaufmann. In Chapter 11
"Security and Protection
" Section 11.5.2
"Spoofing
" the authors describe spoofing as an attack where "the attacker fabricates a network packet with a fake source address." This directly supports the definition of forging a "from" address.