25th IEEE International Conference on Distributed Computing Systems Workshops
DOI: 10.1109/icdcsw.2005.78
|View full text |Cite
|
Sign up to set email alerts
|

InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic

Abstract: Cyber-attackers often use incorrect source IP addresses in attack packets (spoofed IP packets) to achieve anonymity, reduce the risk of trace-back and avoid detection. We present the predictive ingress filtering (InFilter) approach for network-based detection of spoofed IP packets near cyber-attack targets. Our InFilter hypothesis states that traffic entering an IP network from a specific source frequently uses the same ingress point. We have empirically validated this hypothesis by analysis of trace-routes to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…This is an extension of the hypothesis used in [5] which says that the same 'last hop' AS is used by packets from the same source AS prior to entering the destination AS. This is a reasonable extension based on the fact that traffic routes within an AS change infrequently.…”
Section: Spoofed Source Ddos Attack Detectionmentioning
confidence: 95%
See 3 more Smart Citations
“…This is an extension of the hypothesis used in [5] which says that the same 'last hop' AS is used by packets from the same source AS prior to entering the destination AS. This is a reasonable extension based on the fact that traffic routes within an AS change infrequently.…”
Section: Spoofed Source Ddos Attack Detectionmentioning
confidence: 95%
“…Techniques such as [4] and [5] rely on historical observations of IP addresses to identify spoofed traffic. Since our technique maps the IP addresses to AS numbers, we are able to classify as legitimate or spoofed, traffic with IP addresses that have never been observed before, as long as some traffic from the same origin AS has been observed.…”
Section: Spoofed Source Ddos Attack Detectionmentioning
confidence: 99%
See 2 more Smart Citations