Tracking Down Sources of Spoofed IP Packets

CoNEXT Companion(2020)

引用 8|浏览105
暂无评分
摘要
The lack of authentication in the Internet's data plane allows hosts to falsify (spoof) the source IP address in packet headers, which forms the basis for amplification denial-of-service (DoS) attacks. Current approaches to locate sources of spoofed traffic lack coverage or are not deployable today. We propose a mechanism that a network with multiple peering links can use to coarsely locate the sources of spoofed traffic in the Internet. More precisely, the network can monitor and map spoofed traffic arriving on a peering link to the set of sources routed toward that link. We propose mechanisms the network can use to systematically vary BGP announcement configurations to induce changes to Internet routes and to the set of sources routed to each peering link. A network using our technique can correlate observations over multiple configurations to more precisely delineate regions sending spoofed traffic. Evaluation of our techniques on the Internet shows that they can partition the Internet into small regions, allowing targeted intervention.
更多
查看译文
关键词
IP spoofing, traffic filtering, routing policies, topology discovery
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要