Spoofing attacks and their types