Title :
Constructing inter-domain packet filters to control IP Forging
Author :
Aluvala, Srinivas ; Rao, P. Srinivas
Author_Institution :
CSE Dept., Jayamukhi Inst. of Technol. Sci., Warangal, India
Abstract :
IP spoofing is almost always used in what is currently one of the most difficult attacks to defend against-denial of service attacks, or DoS. Since crackers are concerned only with consuming bandwidth and resources, they need not worry about properly completing handshakes and transactions. Rather, they wish to flood the victim with as many packets as possible in a short amount of time. In order to prolong the effectiveness of the attack, they spoof source IP addresses to make tracing and stopping the DoS as difficult as possible. When multiple compromised hosts are participating in the attack, all sending spoofed traffic; it is very challenging to quickly block traffic. While some of the attacks described above are a bit outdated, Such as session hijacking for host-based authentication services, IP spoofing is still prevalent in network scanning and probes, as well as denial of service floods. However, the technique does not allow for anonymous Internet access, which is a common misconception for those unfamiliar with the practice. Any sort of spoofing beyond simple floods is relatively advanced and used in very specific instances such as evasion and connection hijacking.
Keywords :
IP networks; telecommunication security; IP forging; IP spoofing; host-based authentication services; interdomain packet filters; session hijacking; IP networks; Information filters; Internet; Peer to peer computing; Routing; BGP; DDoS; IDPF; IP Spoofing; Network-level Security and protection;
Conference_Titel :
Electronics Computer Technology (ICECT), 2011 3rd International Conference on
Conference_Location :
Kanyakumari
Print_ISBN :
978-1-4244-8678-6
Electronic_ISBN :
978-1-4244-8679-3
DOI :
10.1109/ICECTECH.2011.5942005