Realizing a Source Authentic Internet
نویسندگان
چکیده
An innate deficiency of the Internet is its susceptibility to IP spoofing. Whereas a router uses a forwarding table to determine where it should send a packet, previous research has found that a router can similarly employ an incoming table to verify where a packet should come from, thereby detecting IP spoofing. Based on a previous protocol for building incoming tables, SAVE, this paper introduces new mechanisms that not only address a critical deficiency of SAVE when it is incrementally deployed (incoming table entries becoming obsolete), but can also push the filtering of spoofing packets towards the SAVE router that is closest to spoofers. With these new mechanisms, and under the assumption of incremental deployment, we further discuss the security of SAVE, evaluate its efficacy, accuracy, and overhead, and look into its deployment incentives. Our results show incoming-table-based IP spoofing detection is a feasible and effective solution.
منابع مشابه
Privacy, Discovery, and Authentication for the Internet of Things
Automatic service discovery is essential to realizing the full potential of the Internet of Things (IoT). While discovery protocols like Multicast DNS, Apple AirDrop, and Bluetooth Low Energy have gained widespread adoption across both IoT and mobile devices, most of these protocols do not offer any form of privacy control for the service, and often leak sensitive information such as service ty...
متن کاملNew Opportunities for Authenticity in a World of Changing Biology
Biology now produces massive data, genomic and other types. New ways of building knowledge are thus increasingly reliant on data processing. Biological data and analytical tools, widely accessible via the internet, offer new authentic opportunities to explore, test and validate hypotheses in numerous fields of biology and allow students to engage in the same cognitive processes associated with ...
متن کاملNew Opportunities for Authenticity in a World of Changing
Biology now produces massive genomic and other data, new ways of building knowledge rely ever more on the processing of data through information technology. Biological data such as DNA sequences and analysis tools are widely accessible via Internet and qualify as authentic. They offer new opportunities to explore, test and validate hypotheses in numerous fields of biology and allow students to ...
متن کاملIranian Celebrities on the Internet
Celebrities have gained considerable influence in the last one hundred years or so, but the advent of so-called Web 2.0 technologies has given celebrity culture a new momentum. We are living in a world in which celebrities are striving to curve their place in every niche and hence we have to become more media literate in order to avoid being exploited by celebrity media and culture. We have to ...
متن کاملبررسی و نقد سند و متن یک حدیث تفسیری دربارۀ حروف مقطعۀ قرآن
The Quranic Muqatta'a letters are one of the Quranic topics about which scholars expressed different viewpoints. Considering the interpretation of these letters and the intention of God, many various views have been mentioned. Some narrations are found to interpret these letters. For example, a hadith in Maani al-Akhbar of Sheikh Saduq has interpreted all these letters. This hadith is assumed t...
متن کامل