The Spoofer Project: Inferring the Extent of Source Address Filtering on the Internet
نویسنده
چکیده
Forging, or ”spoofing,” the source addresses of IP packets provides malicious parties with anonymity and novel attack vectors. Spoofing-based attacks complicate network operator’s defense techniques; tracing spoofing remains a difficult and largely manual process. More sophisticated next generation distributed denial of service (DDoS) attacks may test filtering policies and adaptively attempt to forge source addresses. To understand the current state of network filtering, this paper presents an Internet-wide active measurement spoofing project. Clients in our study attempt to send carefully crafted UDP packets designed to infer filtering policies. When filtering of valid packets is in place we determine the filtering granularity by performing adjacent netblock scanning. Our results are the first to quantify the extent and nature of filtering and the ability to spoof on the Internet. We find that approximately one-quarter of the observed addresses, netblocks and autonomous systems (AS) permit full or partial spoofing. Projecting this number to the entire Internet, an approximation we show is reasonable, yields over 360 million addresses and 4,600 ASes from which spoofing is possible. Our findings suggest that a large portion of the Internet is vulnerable to spoofing and concerted attacks employing spoofing remain a serious concern.
منابع مشابه
Using Loops Observed in Traceroute to Infer the Ability to Spoof
Despite source IP address spoofing being a known vulnerability for at least 25 years, and despite many efforts to shed light on the problem, spoofing remains a popular attack method for redirection, amplification, and anonymity. To defeat these attacks requires operators to ensure their networks filter packets with spoofed source IP addresses, known as source address validation (SAV), best depl...
متن کاملاستفاده از اینترنت در مرور ادبیات تحقیق
Introduction: The Significance of research in the Promotion and development of Scientific Capabilities of a country in evident, provided that these research studies are done by analyzing and reviewing the information resources in such a way that avoids duplication of the work already done. Among The information resources, internet is to be the most complete and efficient source of information p...
متن کاملAn ultra low power wake-up signal decoder for wireless nodes activation in Internet of Things technology
This paper proposes a new structure for digital address decoders based on flip-flops with application in wake-up signal generators of wireless networks nodes. Such nodes equipped with this device can be utilized in Internet of Things applications where the nodes are dependent on environment energy harvesting to survive for a long time. Different parts in these wireless nodes should have an e...
متن کاملSeeking Source Discourse Ideology by English and Persian Translators: A Comparative Think Aloud Protocol Study
Discourse audiences are susceptible to fall victims of the concealed ideological representations in discourses at the expanse of changing and modifying their mental models through which they act on the world. Translators as readers and at the same time intercultural mediators need to be equipped with the knowledge of how ideology is accommodated in discourse both not to fall victim to it and to...
متن کاملPower plant project risk assessment using a fuzzy-ANP and fuzzy-TOPSIS method
Economic growth in developing countries has resulted in increasing demand for infrastructure projects like power plants. To meet these development needs, the government of Iran has engaged companies to carry out power plant projects. While many papers have been written on the subject of project risk management, little information exists on the actual use of risk management in practice. The prim...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005