SAVT: A Practical Scheme for Source Address Validation and Traceback in Campus Network

被引:0
|
作者
Hu, Guangwu [1 ]
Wu, Jianping [1 ]
Xu, Ke [1 ]
Chen, Wenlong [2 ]
机构
[1] Tsinghua Univ, Tsinghua Natl Lab Informat Sci & Technol, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[2] Univ Sci & Tech Beijing, Sch Informat Engn, Beijing, Peoples R China
关键词
source address validation; traceback; SAVI; SAVT;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In current network, as we all know, packets delivered by routers only rely on destination-address-directed forwarding, but their source addresses are not checked. Consequently, this incurs many serious network security breach events which are hard to trackback. Under this situation, a switch (we call it SAVI switch) followed SAVI (Source Address Validation Improvement) framework proposed by IETF was invented which dedicates to resolving this problem in user local subnet. SAVI switch is a direct and very effective anti-spoofing device, but because it just steps into a phase of industrialization and for economical and incremental deployment reasons, these switches are not fully covered in domain. This results in two issues at the same time: 1) how to filter out and abandon those packets whose source IP addresses belong to SAVI switches coverage, but actually not, otherwise, this will severely compromise the SAVI switch access users' motivation and SAVI's promotion. 2) how to traceback those packets' source router-the first hop routers of spoofed packets. In this paper, we present SAVT, a practical and smart scheme for source address validation and traceback in campus network for all outbound packets, it just need less 25% routers as filter router can resolve those two questions in most condition. Experiments illustrate our proposal keeps the promise of practicality, stability and efficiency.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] MIB Design and Application for Source Address Validation Improvement Protocol
    An, Changqing
    Wang, Hui
    Yang, Jiahai
    2011 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2011,
  • [42] A New Scheme for Proactive Out of Band Signaling Solution for IP Traceback in Wireless Mesh Network
    Gassara, Mouna
    Zarai, Faouzi
    Daly, Ikbel
    Obaidat, Mohammad S.
    Hsiao, Kuei-Fang
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (CITS), 2015,
  • [43] The Impact of Using Source Address Validation Filtering on Processing Resources
    Strugaru, Ovidiu
    Potorac, Alin D.
    Graur, Adrian
    2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,
  • [44] Building a next generation Internet with source address validation architecture
    WU JianPing1
    2 Department of Electronic Engineering
    3 Tsinghua National Laboratory for Information Science and Technology(TNList)
    Science in China(Series F:Information Sciences), 2008, (11) : 1681 - 1691
  • [45] Building a next generation Internet with source address validation architecture
    JianPing Wu
    Gang Ren
    Xing Li
    Science in China Series F: Information Sciences, 2008, 51 : 1681 - 1691
  • [46] Understanding the Efficacy of Deployed Internet Source Address Validation Filtering
    Beverly, Robert
    Berger, Arthur
    Hyun, Young
    Claffy, K.
    IMC'09: PROCEEDINGS OF THE 2009 ACM SIGCOMM INTERNET MEASUREMENT CONFERENCE, 2009, : 356 - 369
  • [47] Building a next generation Internet with source address validation architecture
    Wu JianPing
    Ren Gang
    Li Xing
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2008, 51 (11): : 1681 - 1691
  • [48] The automatic peer-to-peer signature for source address validation
    Shen, Yan
    Bi, Jun
    Wu, Jianping
    Liu, Qiang
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT I, PROCEEDINGS, 2007, 4692 : 855 - +
  • [49] SAVSH: IP Source Address Validation for SDN Hybrid Networks
    Chen, Guolong
    Hu, Guangwu
    Jiang, Yong
    Zhang, Chaoqin
    2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2016, : 409 - 414
  • [50] Source attribution for network address translated forensic captures
    Cohen, M. I.
    DIGITAL INVESTIGATION, 2009, 5 (3-4) : 138 - 145