期刊文献+

Preventing IP Source Address Spoofing: A Two-Level, State Machine-Based Method 被引量:3

Preventing IP Source Address Spoofing: A Two-Level, State Machine-Based Method
原文传递
导出
摘要 A signature-and-verification-based method, automatic peer-to-peer anti-spoofing (APPA), is pro- posed to prevent IP source address spoofing. In this method, signatures are tagged into the packets at the source peer, and verified and removed at the verification peer where packets with incorrect signatures are filtered. A unique state machine, which is used to generate signatures, is associated with each ordered pair of APPA peers. As the state machine automatically transits, the signature changes accordingly. KISS ran- dom number generator is used as the signature generating algorithm, which makes the state machine very small and fast and requires very low management costs. APPA has an intra-AS (autonomous system) level and an inter-AS level. In the intra-AS level, signatures are tagged into each departing packet at the host and verified at the gateway to achieve finer-grained anti-spoofing than ingress filtering. In the inter-AS level, signatures are tagged at the source AS border router and verified at the destination AS border router to achieve prefix-level anti-spoofing, and the automatic state machine enables the peers to change signatures without negotiation which makes APPA attack-resilient compared with the spoofing prevention method. The results show that the two levels are both incentive for deployment, and they make APPA an integrated anti-spoofing solution. A signature-and-verification-based method, automatic peer-to-peer anti-spoofing (APPA), is pro- posed to prevent IP source address spoofing. In this method, signatures are tagged into the packets at the source peer, and verified and removed at the verification peer where packets with incorrect signatures are filtered. A unique state machine, which is used to generate signatures, is associated with each ordered pair of APPA peers. As the state machine automatically transits, the signature changes accordingly. KISS ran- dom number generator is used as the signature generating algorithm, which makes the state machine very small and fast and requires very low management costs. APPA has an intra-AS (autonomous system) level and an inter-AS level. In the intra-AS level, signatures are tagged into each departing packet at the host and verified at the gateway to achieve finer-grained anti-spoofing than ingress filtering. In the inter-AS level, signatures are tagged at the source AS border router and verified at the destination AS border router to achieve prefix-level anti-spoofing, and the automatic state machine enables the peers to change signatures without negotiation which makes APPA attack-resilient compared with the spoofing prevention method. The results show that the two levels are both incentive for deployment, and they make APPA an integrated anti-spoofing solution.
出处 《Tsinghua Science and Technology》 SCIE EI CAS 2009年第4期413-422,共10页 清华大学学报(自然科学版(英文版)
基金 Supported by the Basic Research Foundation of the Tsinghua National Laboratory for Information Science and Technology (TNList) the National Key Basic Research and Development (973) Program of China (No. 2008BAH37B02)
关键词 source address spoofing spoofing prevention internet security source address spoofing spoofing prevention internet security
  • 相关文献

参考文献10

  • 1US-CERT.The continuing denial of service threat posed by DNS recursion. http://www.us-cert.gov/reading_room/ DNS-recursion033006.pdf . 2006 被引量:1
  • 2ICANN Security and Stability Advisory Committee (SSAC).DNS distributed denial of service (DDOS) attacks. http://www.icann.org/en/committees/security/dns-ddos-adv- ory-31mar06.pdf . 2006 被引量:1
  • 3CERT (Carnegie Mellon University’s Computer Emer- gency Response Team).CERT research annual report. http://www.cert.org/ . 2006 被引量:1
  • 4Cisco.Unicast reverse path forwarding. Cisco IOS Soft- ware Releases 11.1. http://www.cisco.com/en/US/docs/ ios/11_1/feature/guide/uni_rpf.html#wp1021243 . 2007 被引量:1
  • 5Bremler-Barr A,Levy H.Spoofing prevention method[].th Annual Joint Conference of the IEEE Computer and Communications Societies.2005 被引量:1
  • 6Jin C,Wang H,Shin K G.Hop-count filtering: An effective defense against spoofed DDOS traffic[].Proceedings of the th ACM Conference on Computer and Communica- tions Security.2003 被引量:1
  • 7Kent S.IP authentication header[].RFC.2005 被引量:1
  • 8Liu X,Yang X,Wetherall D, et al.Efficient and secure source authentication with packet passports[].Proceed- ings of the nd Conference on Steps to Reducing Un- wanted Traffic on the Internet.2006 被引量:1
  • 9Hu Y,Jakobsson M,Perrig A.Efficient constructions for one-way hash chains[].Proceedings of Applied Cryptog- raphy and Network Security (ACNS).2005 被引量:1
  • 10Marsaglia G.KISS random number generator[]..2003 被引量:1

同被引文献17

引证文献3

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部