Learning the valid incoming direction of IP packets

نویسندگان

  • Jun Li
  • Jelena Mirkovic
  • Toby Ehrenkranz
  • Mengqiu Wang
  • Peter L. Reiher
  • Lixia Zhang
چکیده

Packet forwarding on the Internet is solely based on the destination address of packets, and it is easy to forge the source address of IP packets without affecting the delivery of the packets. To solve this problem, one can have routers check whether or not every packet comes from a correct direction based on its source address field. However, due to routing asymmetry in today’s Internet, a router cannot simply reverse its forwarding table to determine the correct incoming direction of a packet. In this paper, we present the source address validity enforcement protocol, SAVE, which allows routers to learn valid incoming directions for any given source address. SAVE is independent from—and can work with—any specific routing protocol. By only interfacing with the forwarding table at routers, SAVE allows routers to properly propagate valid source address information from source address spaces to all destinations, and allows each router en route to build and maintain an incoming tree to associate each source address prefix with a corresponding incoming interface. The incoming tree is further valuable in handling routing changes: although a routing change at one router could affect the incoming direction of source address spaces from many locations, only the router that sees the change needs to send out new updates. Finally, SAVE has a good performance with low overhead. ! 2007 Elsevier B.V. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Incrementally Deployable Protocol for Learning the Valid Incoming Direction of IP Packets

Routers in today’s Internet do not know which direction a packet with a given source address should come from. This problem not only allows IP spoofing to run wild—as routers cannot check the validity of a packet’s source address based on its incoming direction—but also hinders the reliability of many source-relevant functions at routers, such as per-source fair queuing, source-based traffic ma...

متن کامل

An IP Format Based Algorithm for ZigBee Routing Protocol Optimization

Learning from the conventional practice of network IP address format, this paper proposed an IP-format-based algorithm for ZigBee energy-balanced routing protocol optimization. The algorithm combines node’s cluster address and node’s network short address into a new address and divides the address’s field as IP-format. So that the address will contain information of the network’s topology and p...

متن کامل

SAVE: Source Address Validity Enforcement Protocol

SAVE: Source Address Validity Enforcement Protocol Jun Li Jelena Mirkovic Mengqiu Wang Peter Reiher Lixia Zhang ABSTRACT Many network attacks forge the source address in their IP packets to block traceback. Recently, research activity has focused on packet-tracing mechanisms to counter this deception. Unfortunately, these mechanisms are either too expensive or ineffective against distributed at...

متن کامل

Analysis of Intrusion Detection System Using Trusted Clients

Traditionally firewall has been used to stop the intrusion attempts by an attacker. But firewalls have static configurations that block attacks based on source and destination ports and IP addresses. These are not sufficient to provide security from all the attacks. Therefore, we need IDS type systems which could analyze the payload of the packet to detect these attacks. Proposed IDS is in two ...

متن کامل

Extraction of Anomaly Accessed Ip Packets Features Using Statistical Method

To defend DoS (Denial of Service) attacks, an access filtering mechanism is adopted in the firewall or the IDS (Intrusion Detection System). The difficulty to define the filtering rules lies where normal and anomaly packets have to be distinguished in incoming packets. The purpose of our research is to explore the early detective method for anomaly accesses based on statistic analysis. In this ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computer Networks

دوره 52  شماره 

صفحات  -

تاریخ انتشار 2008