2010 IEEE Globecom Workshops 2010
DOI: 10.1109/glocomw.2010.5700211
|View full text |Cite
|
Sign up to set email alerts
|

On the use of BGP AS numbers to detect spoofing

Abstract: Spoofed IP traffic (traffic containing packets with incorrect source IP addresses) is often used by Internet-based attackers for anonymity. This method reduces the risk of traceback and avoids attack detection by traffic-based sensors. An ISP's Security Operations Center (SOC) needs an efficient spoofed source detection mechanism to protect its customers from network based attacks. Typically an SOC needs to offer such protection under the following operational constraints: a) Limited traffic monitoring points … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…The chelating node checks for the presence of spoofed/bogus paths in the nodes routing table. Origin association of AS prefixes as proposed in Vaidyanathan et al 53 and Qiu et al 54 was used to achieve this.…”
Section: ) Path Spoofing Detectionmentioning
confidence: 99%
“…The chelating node checks for the presence of spoofed/bogus paths in the nodes routing table. Origin association of AS prefixes as proposed in Vaidyanathan et al 53 and Qiu et al 54 was used to achieve this.…”
Section: ) Path Spoofing Detectionmentioning
confidence: 99%
“…Then, it sends them back to the client or the requester [32–37, 4549]. The client has to solve a puzzle by using a random number that is sent by web server (web application).…”
Section: Flexible Collaborative Multilayer Ddos Prevention Frammentioning
confidence: 99%