2020
DOI: 10.1007/978-3-030-44081-7_7
|View full text |Cite
|
Sign up to set email alerts
|

Don’t Forget to Lock the Front Door! Inferring the Deployment of Source Address Validation of Inbound Traffic

Abstract: This paper concerns the problem of the absence of ingress filtering at the network edge, one of the main causes of important network security issues. Numerous network operators do not deploy the best current practice-Source Address Validation (SAV) that aims at mitigating these issues. We perform the first Internet-wide active measurement study to enumerate networks not filtering incoming packets by their source address. The measurement method consists of identifying closed and open DNS resolvers handling requ… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(20 citation statements)
references
References 33 publications
0
20
0
Order By: Relevance
“…We have started longitudinal measurements to infer the deployment of SAV in both IPv4 and IPv6 address spaces [6] and plan to notify all parties affected by the vulnerability.…”
Section: Results and Conclusionmentioning
confidence: 99%
See 1 more Smart Citation
“…We have started longitudinal measurements to infer the deployment of SAV in both IPv4 and IPv6 address spaces [6] and plan to notify all parties affected by the vulnerability.…”
Section: Results and Conclusionmentioning
confidence: 99%
“…In this paper, we report on the results of the Closed Resolver Project [6,7,19]. We propose a new method to identify networks not filtering inbound traffic based on source IP addresses.…”
Section: Introductionmentioning
confidence: 99%
“…ISPs should also follow security bestpractices to mitigate abuse. Examples of some security best-practices for ISPs include the use of walled-gardens to quarantine and isolate infected machines connected to the Internet (C ¸etin et al 2018, 2019), or deploying Source Address Validation, also known as BCP38, to prevent Distributed Denial-of-Service (DDoS) attacks from being launched via their infrastructure (Luckie et al 2019; Korczyński et al 2020;Lone et al 2017). Yet, again, the voluntary nature of implementing such best practices results in certain ISPs experiencing a higher level of abuse than others due to having laxer security practices.…”
Section: Internet Service Providersmentioning
confidence: 99%
“…Lack of destination side source address validation results in hosts behind a firewall to become partially accessible to externals leveraging source IP address spoofing [16,22]. DNS resolvers residing in such networks are known to be vulnerable to DNS cache poisoning attacks, but can also be misused in DDoS attacks.…”
Section: Related Workmentioning
confidence: 99%