Revisiting inter-AS IP Spoofing Let the Protection Drive Source Address Validation

被引:0
|
作者
Jia, Yihao [1 ,2 ,3 ]
Liu, Ying [1 ,3 ]
Ren, Gang [1 ,3 ]
He, Lin [1 ,2 ,3 ]
机构
[1] Tsinghua Univ, Inst Network Sci & Cyberspace, Beijing 100084, Peoples R China
[2] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[3] Tsinghua Natl Lab Informat Sci & Technol, Beijing 100084, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
IP spoofing, which is prevalently used for anonymity and reflection attacks, has shown increasing destructive power in recent years. Although certain source address validation solutions have been standardized by the Internet Engineering Task Force, few networks are willing to adopt them in view of the deficiency of deployment benefits. Actually, all the source address validation solutions face the problem of a lack of deployability. In this paper, we summarize the key points describing deployability and propose a new security service-inter-autonomous-system (AS) Source Address Protection (iSAP). Technically, by increasing the possibility of keeping the source address belonging to one AS from being the victim of reflection flooding, iSAP improves the deployers ability to prevent IP spoofing and increases incremental deployability. In reality, such a service can also be regarded as a new profit opportunity for ASes and it could progress gradually once it is well commercialized. Based on simulations with real Internet topology data, the results illustrate that iSAP can protect ASes from being reflected with only a few deployers, exhibiting a high potential to mitigate reflection flooding with modest resource consumption.
引用
收藏
页数:10
相关论文
共 18 条
  • [11] Toward Practical Inter-Domain Source Address Validation
    Wang, Xiaoliang
    Xu, Ke
    Guo, Yangfei
    Wang, Haiyang
    Fu, Songtao
    Li, Qi
    Wu, Bin
    Wu, Jianping
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, 32 (04) : 3126 - 3141
  • [12] Preventing IP Source Address Spoofing: A Two-Level, State Machine-Based Method
    毕军
    刘冰洋
    吴建平
    沈燕
    Tsinghua Science and Technology, 2009, 14 (04) : 413 - 422
  • [13] An hierarchical inter-domain authenticated source address validation solution
    Li, Jie
    Wu, Jian-Ping
    Xu, Ke
    Chen, Wen-Long
    Jisuanji Xuebao/Chinese Journal of Computers, 2012, 35 (01): : 85 - 100
  • [14] HyPASS: Design of hybrid-SDN prevention of attacks of source spoofing with host discovery and address validation
    Meena, Ramesh Chand
    Bhatia, Surbhi
    Jhaveri, Rutvij H.
    Cheng, Long
    Kumar, Ankit
    Mashat, Arwa
    PHYSICAL COMMUNICATION, 2022, 55
  • [15] SafeZone: A Hierarchical Inter-Domain Authenticated Source Address Validation Solution
    Li, Jie
    Wu, Jianping
    Xu, Ke
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [16] On the deployability evaluation model of internet inter-domain source address validation
    Liu, Bing-Yang
    Bi, Jun
    Jisuanji Xuebao/Chinese Journal of Computers, 2015, 38 (03): : 500 - 514
  • [17] A Multi-Fence Countermeasure Based Inter-domain Source Address Validation Method
    Li, Jie
    Bi, Jun
    Wu, Jianping
    Zhang, Wei
    2012 11TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2012, : 259 - 262
  • [18] Preventing DRDoS Attacks in 5G Networks: a New Source IP Address Validation Approach
    Chen, Xu
    Feng, Wei
    Ma, Yinglun
    Ge, Ning
    Wang, xianbin
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,