SAVE: Source Address Validity Enforcement Protocol
نویسندگان
چکیده
SAVE: Source Address Validity Enforcement Protocol Jun Li Jelena Mirkovic Mengqiu Wang Peter Reiher Lixia Zhang ABSTRACT Many network attacks forge the source address in their IP packets to block traceback. Recently, research activity has focused on packet-tracing mechanisms to counter this deception. Unfortunately, these mechanisms are either too expensive or ineffective against distributed attacks where traffic comes from multiple directions, and the volume in each direction is small. We believe that the fundamental solution to the problem of source address forging is to validate source addresses throughout the network. We have developed a source address filtering protocol that establishes and maintains valid incoming interface information on source addresses at each router, thus allowing all packets carrying improper source addresses to be immediately identified. Our protocol works correctly in the presence of asymmetric routing. We will describe the protocol that gathers the information to validate source addresses and use simulation to demonstrate that it is effective and has reasonable costs.
منابع مشابه
Learning the valid incoming direction of IP packets
Packet forwarding on the Internet is solely based on the destination address of packets, and it is easy to forge the source address of IP packets without affecting the delivery of the packets. To solve this problem, one can have routers check whether or not every packet comes from a correct direction based on its source address field. However, due to routing asymmetry in today’s Internet, a rou...
متن کاملAn Incrementally Deployable Protocol for Learning the Valid Incoming Direction of IP Packets
Routers in today’s Internet do not know which direction a packet with a given source address should come from. This problem not only allows IP spoofing to run wild—as routers cannot check the validity of a packet’s source address based on its incoming direction—but also hinders the reliability of many source-relevant functions at routers, such as per-source fair queuing, source-based traffic ma...
متن کاملiSAVE: Incrementally Deployable Source Address Validation
Reliable information concerning the reverse path to a particular source address space would be useful for a number of applications, most notably for the filtering of packets with spoofed source addresses. The SAVE protocol makes this information available at every router, although, in the absence of full deployment, it is difficult for SAVE to maintain either correct or complete incoming tables...
متن کاملSeeking Source Discourse Ideology by English and Persian Translators: A Comparative Think Aloud Protocol Study
Discourse audiences are susceptible to fall victims of the concealed ideological representations in discourses at the expanse of changing and modifying their mental models through which they act on the world. Translators as readers and at the same time intercultural mediators need to be equipped with the knowledge of how ideology is accommodated in discourse both not to fall victim to it and to...
متن کاملDefinition of Master Key between PANA Client and Enforcement Point
This document defines a master key used between a client of the Protocol for carrying Authentication for Network Access (PANA) and an enforcement point, for bootstrapping lower-layer ciphering. The master key is derived from the Master Session Key of the Extensible Authentication Protocol as a result of successful PANA authentication. The master key guarantees cryptographic independence among e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002