SAVT: A Practical Scheme for Source Address Validation and Traceback in Campus Network

被引:0
|
作者
Hu, Guangwu [1 ]
Wu, Jianping [1 ]
Xu, Ke [1 ]
Chen, Wenlong [2 ]
机构
[1] Tsinghua Univ, Tsinghua Natl Lab Informat Sci & Technol, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[2] Univ Sci & Tech Beijing, Sch Informat Engn, Beijing, Peoples R China
关键词
source address validation; traceback; SAVI; SAVT;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In current network, as we all know, packets delivered by routers only rely on destination-address-directed forwarding, but their source addresses are not checked. Consequently, this incurs many serious network security breach events which are hard to trackback. Under this situation, a switch (we call it SAVI switch) followed SAVI (Source Address Validation Improvement) framework proposed by IETF was invented which dedicates to resolving this problem in user local subnet. SAVI switch is a direct and very effective anti-spoofing device, but because it just steps into a phase of industrialization and for economical and incremental deployment reasons, these switches are not fully covered in domain. This results in two issues at the same time: 1) how to filter out and abandon those packets whose source IP addresses belong to SAVI switches coverage, but actually not, otherwise, this will severely compromise the SAVI switch access users' motivation and SAVI's promotion. 2) how to traceback those packets' source router-the first hop routers of spoofed packets. In this paper, we present SAVT, a practical and smart scheme for source address validation and traceback in campus network for all outbound packets, it just need less 25% routers as filter router can resolve those two questions in most condition. Experiments illustrate our proposal keeps the promise of practicality, stability and efficiency.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] FBT: an efficient traceback scheme in hierarchical wireless sensor network
    Cheng, Bo-Chao
    Chen, Huan
    Liao, Guo-Tan
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (02) : 133 - 144
  • [22] Security of source address validation improvement binding table in software defined network
    Li D.
    Lu Y.
    Yu J.-Q.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2020, 54 (08): : 1543 - 1549
  • [23] A Novel scheme of the Secure Campus Network
    Ao, Lei
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 343 - 346
  • [24] ACHIEVEMENT OF SSO SCHEME IN CAMPUS NETWORK
    Zhang, Wenting
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 277 - 279
  • [25] Application of Network Technology in Campus Public Address System
    Liu, Yuming
    Ma, Huimin
    ADVANCES IN APPLIED SCIENCES AND MANUFACTURING, PTS 1 AND 2, 2014, 850-851 : 596 - 599
  • [26] A fast search and advanced marking scheme for network IP traceback model
    Hou, J
    Lee, MH
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2005, 3816 : 15 - 20
  • [27] Source address validation: Architecture and protocol design
    Wu, Jianping
    Ren, Gang
    Li, Xing
    2007 IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, 2007, : 276 - +
  • [28] Source Address Validation in Software Defined Networks
    Liu, Bingyang
    Bi, Jun
    Zhou, Yu
    PROCEEDINGS OF THE 2016 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION (SIGCOMM '16), 2016, : 595 - 596
  • [29] The Benefits and Challenges of a Regional Network to Address Campus Sexual Assault
    McGann, Patrick
    E. Palmer, Jane
    Thomas, Greerlin
    Ricci, Lauren
    Haake, Leah
    HEALTH EDUCATION & BEHAVIOR, 2020, 47 (1_SUPPL) : 26S - 35S
  • [30] Feasible DDoS attack source traceback scheme by deterministic multiple packet marking mechanism
    Suresh, S.
    Ram, N. Sankar
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (06): : 4232 - 4246