Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security 2019
DOI: 10.1145/3319535.3354232
|View full text |Cite
|
Sign up to set email alerts
|

Network Hygiene, Incentives, and Regulation

Abstract: The Spoofer project has collected data on the deployment and characteristics of IP source address validation on the Internet since 2005. Data from the project comes from participants who install an active probing client that runs in the background. The client automatically runs tests both periodically and when it detects a new network attachment point. We analyze the rich dataset of Spoofer tests in multiple dimensions: across time, networks, autonomous systems, countries, and by Internet protocol version. In … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
26
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 51 publications
(26 citation statements)
references
References 34 publications
0
26
0
Order By: Relevance
“…It can be divided into inbound source address validation (ISAV) and outbound source address validation (OSAV) [22], [14], [41]. While a majority of observed networks (∼85% prefixes and ∼70% autonomous systems) have deployed OSAV according to the Spoofer project [47], [9], [6], the lack of ISAV is much more pervasive [14], [41]. Therefore, it is crucial to understand the Internet-wide ISAV deployment.…”
Section: Measuring Deployment Of Inbound Source Addressmentioning
confidence: 99%
See 3 more Smart Citations
“…It can be divided into inbound source address validation (ISAV) and outbound source address validation (OSAV) [22], [14], [41]. While a majority of observed networks (∼85% prefixes and ∼70% autonomous systems) have deployed OSAV according to the Spoofer project [47], [9], [6], the lack of ISAV is much more pervasive [14], [41]. Therefore, it is crucial to understand the Internet-wide ISAV deployment.…”
Section: Measuring Deployment Of Inbound Source Addressmentioning
confidence: 99%
“…While previous work for ISAV deployment measurements mainly relied on in-network volunteers [47], [9], [6] or DNS resolvers [41], [14], all of our measurements can be performed from one local vantage point with better coverage, and do not rely on in-network volunteers or in-network open DNS servers. Our measurements cover ∼9.7k ASes, finding that ∼79% of them are (partially) vulnerable to spoofing, which is the most large-scale measurement study of IPv6 ISAV to date.…”
Section: Measuring Deployment Of Inbound Source Addressmentioning
confidence: 99%
See 2 more Smart Citations
“…Thus, DNS packets with spoofed IP addresses can leave the network. Recent work showed that such misconfigured networks are still not uncommon on the Internet[33,31] and they are publicly listed[8]. The attacker does not have any special hardware or software requirements, because a single DNS packet, occasionally resent, is enough to keep the loop going.…”
mentioning
confidence: 99%