Hop-Count Filtering: A Defense Against Spoofed IP Traffic
نویسندگان
چکیده
IP spoofing has often been exploited by Distributed Denial of Service (DDoS) attacks to (1) conceal flooding sources and dilute localities in flooding traffic, and (2) coax legitimate hosts into becoming reflectors, redirecting and amplifying flooding traffic. Thus, the ability to filter spoofed IP packets near victim servers is essential to their own protection and prevention of becoming involuntary DoS reflectors. Although an attacker can forge any field in the IP header, he cannot falsify the number of hops an IP packet takes to reach its destination. More importantly, since the hopcount values are diverse, an attacker cannot randomly spoof IP addresses while maintaining consistent hop-counts. On the other hand, an Internet server can easily infer the hop-count information from the Time-to-Live (TTL) field of the IP header. Using a mapping between IP addresses and their hop-counts, the server can distinguish spoofed IP packets from legitimate ones. Based on this observation, we present a novel filtering technique, called Hop-Count Filtering (HCF)—which builds an accurate IP-tohop-count (IP2HC) mapping table—to detect and discard spoofed IP packets. HCF is easy to deploy, as it does not require any support from the underlying network. Through analysis using network measurement data, we show that HCF can identify close to 90% of spoofed IP packets, and then discard them with little collateral damage. We implement and evaluate HCF in the Linux kernel, demonstrating its effectiveness with experimental measurements.
منابع مشابه
Hop-Count Filtering: An Effective Defense Against Spoofed Traffic
IP spoofing has been exploited by Distributed Denial of Service (DDoS) attackers to (1) conceal flooding sources and localities of flooding traffic, and (2) coax uncompromised hosts into becoming reflectors, redirecting and amplifying flooding traffic. Thus, the ability to filter spoofed IP packets near victims is essential to their own protection as well as to their avoidance of becoming invol...
متن کاملTwo layer defending mechanism against DDOS attacks
Distributed Denial of Service (DDoS) attackers make a service unavailable for intended users. Attackers use IP spoofing as a weapon to disguise their identity. The spoofed traffic follows the same principles as normal traffic, so detection and filtering is very essential. Hop Count Filtering (HCF) scheme identifies packet whose source IP address is spoofed. The information about a source IP add...
متن کاملC. Project Summary
IP spoofing accompanies and exacerbates many Internet security threats. In distributed denial-of-service (DDoS) attacks spoofing prevents the attack target from recognizing legitimate clients and forces inaccurate filtering response. In reflector DDoS attacks, spoofing invokes unsolicited responses from Internet servers to the target. Spoofing is also used for distributed vulnerability scanning...
متن کاملA New Approach to Defend against Ddos
We propose a mechanism which combines the advantage of cryptographic client puzzle and hop count filtering as a countermeasure to spoofed DOS attack. Once the communication channel has been established then HCF starts its work wherein an Internet server can easily infer the hop-count information from the Time-to-Live (TTL) field of the IP header. Using a mapping between IP addresses and their h...
متن کاملFHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks
DDoS attacks represent a significant threat for companies, affecting them on a regular basis, as reported in the 2013 Information Security Breaches Survey. The most common target is web services, the downtime of which could lead to significant monetary costs and loss of reputation. IP Spoofing is often used in DDoS attacks not only to protect the identity of offending bots but also to overcome ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005