usenix conference policies
You are here
The Spoofer Project: Inferring the Extent of Internet Source Address Filtering on the Internet
Forging, or "spoofing," the source addresses of IP packets provides malicious parties with anonymity and novel attack vectors. Spoofing-based attacks complicate network operator's defense techniques; tracing spoofing remains a difficult and largely manual process. More sophisticated next generation distributed denial of service (DDoS) attacks may test filtering policies and adaptively attempt to forge source addresses. To understand the current state of network filtering, this paper presents an Internet-wide active measurement spoofing project. Clients in our study attempt to send carefully crafted UDP packets designed to infer filtering policies. When filtering of valid packets is in place we determine the filtering granularity by performing adjacent netblock scanning. Our results are the first to quantify the extent and nature of filtering and the ability to spoof on the Internet. We find that approximately one-quarter of the observed addresses, netblocks and autonomous systems (AS) permit full or partial spoofing. Projecting this number to the entire Internet, an approximation we show is reasonable, yields over 360 million addresses and 4,600 ASes from which spoofing is possible. Our findings suggest that a large portion of the Internet is vulnerable to spoofing and concerted attacks employing spoofing remain a serious concern.
author = {Robert Beverly and Steve Bauer},
title = {The Spoofer Project: Inferring the Extent of Internet Source Address Filtering on the Internet},
booktitle = {Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI 05)},
year = {2005},
address = {Cambridge, MA},
url = {https://www.usenix.org/conference/sruti-05/spoofer-project-inferring-extent-internet-source-address-filtering-internet},
publisher = {USENIX Association},
month = jul
}
connect with us