Chrome Extension
WeChat Mini Program
Use on ChatGLM

Tracking Down Sources of Spoofed IP Packets

CoNEXT Companion(2020)

Cited 8|Views118
No score
Abstract
The lack of authentication in the Internet's data plane allows hosts to falsify (spoof) the source IP address in packet headers, which forms the basis for amplification denial-of-service (DoS) attacks. Current approaches to locate sources of spoofed traffic lack coverage or are not deployable today. We propose a mechanism that a network with multiple peering links can use to coarsely locate the sources of spoofed traffic in the Internet. More precisely, the network can monitor and map spoofed traffic arriving on a peering link to the set of sources routed toward that link. We propose mechanisms the network can use to systematically vary BGP announcement configurations to induce changes to Internet routes and to the set of sources routed to each peering link. A network using our technique can correlate observations over multiple configurations to more precisely delineate regions sending spoofed traffic. Evaluation of our techniques on the Internet shows that they can partition the Internet into small regions, allowing targeted intervention.
More
Translated text
Key words
IP spoofing, traffic filtering, routing policies, topology discovery
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined