首页> 外文会议>National Conference on Communications >Inferring the Deployment of Source Address Validation Filtering using Silence of Path-Backscatter
【24h】

Inferring the Deployment of Source Address Validation Filtering using Silence of Path-Backscatter

机译:使用路径反向散射的沉默来推断源地址验证过滤的部署

获取原文

摘要

IP source spoofing is a consequence of lack of packet level authentication in the Internet which allows attackers to carry out Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. Source address validation filtering is one of the most important scheme that is deployed in the Internet to deter such attacks by filtering the spoofed IP packets. In this paper, we propose a novel scheme to study the deployment of source address validation-filtering by using some special path backscatter messages that are generated by the spoofed traffic. We use the long term absence of such messages from an Autonomous System (AS) to classify it as non-spoofer AS. We use Caida's backscatter dataset for our study. We provide the list of spoofer and non-spoofer ASes from the given dataset. We also provide detailed mathematical analysis for calculating the amount of time we need to wait before declaring an AS as a non-spoofer. Besides, we use the normal approximation of binomial distribution to calculate confidence interval for the proportion of ASes allowing spoofing and to test the hypothesis regarding the spoofing activity in the Internet.
机译:IP源欺骗是Internet上缺乏数据包级别身份验证的结果,Internet数据包级别身份验证使攻击者能够进行拒绝服务(DoS)和分布式拒绝服务(DDoS)攻击。源地址验证过滤是在Internet上部署的最重要的方案之一,它通过过滤欺骗的IP数据包来阻止此类攻击。在本文中,我们提出了一种新颖的方案,以通过使用由欺骗性流量生成的一些特殊的路径反向散射消息来研究源地址验证-过滤的部署。我们使用来自自治系统(AS)的此类消息的长期缺乏,将其分类为非欺骗性AS。我们使用凯达(Caida)的反向散射数据集进行研究。我们提供给定数据集中的欺骗者和非欺骗者AS的列表。我们还提供详细的数学分析,以计算在将AS声明为非欺骗性用户之前需要等待的时间。此外,我们使用二项式分布的正态近似来计算允许进行欺骗的AS的比例的置信区间,并测试有关Internet中欺骗活动的假设。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号