2019
DOI: 10.3390/computers8040081
|View full text |Cite
|
Sign up to set email alerts
|

IP Spoofing In and Out of the Public Cloud: From Policy to Practice

Abstract: In recent years, a trend that has been gaining particular popularity among cybercriminals is the use of public Cloud to orchestrate and launch distributed denial of service (DDoS) attacks. One of the suspected catalysts for this trend appears to be the increased tightening of regulations and controls against IP spoofing by world-wide Internet service providers (ISPs). Three main contributions of this paper are (1) For the first time in the research literature, we provide a comprehensive look at a number of pos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…Conventionally, internet protocol (IP) enabled devices have been using user-defined identifiers, such as IP and media access control (MAC) addresses, as a form of identifications. However, these identifiers have been proven to be vulnerable [3] to various attacks, such as spoofing [4] and device mobility, due to the availability of malicious software [5] , for performing such attacks. Device fingerprinting (DFP) [3] represents one technique that may be used to identify devices based on their communication traffic traces (or digital footprints) without using explicit identifiers, and it can be performed, either actively or passively, from different layers of the communication model [6] .…”
Section: Introductionmentioning
confidence: 99%
“…Conventionally, internet protocol (IP) enabled devices have been using user-defined identifiers, such as IP and media access control (MAC) addresses, as a form of identifications. However, these identifiers have been proven to be vulnerable [3] to various attacks, such as spoofing [4] and device mobility, due to the availability of malicious software [5] , for performing such attacks. Device fingerprinting (DFP) [3] represents one technique that may be used to identify devices based on their communication traffic traces (or digital footprints) without using explicit identifiers, and it can be performed, either actively or passively, from different layers of the communication model [6] .…”
Section: Introductionmentioning
confidence: 99%