A filter check system for defeating attacks which employ IP source address spoofing

被引:0
作者
Shiraishi, Yoshiaki [1 ]
Fukuta, Youji [1 ]
Morii, Masakatu [1 ]
机构
[1] Nagoya Inst Technol, Nagoya, Aichi 4668555, Japan
来源
WMSCI 2007: 11TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS | 2007年
关键词
IP spoofing packet; egress filtering; backbone network; ICMP; traceroute;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To secure network layer is needed for stable IP network as infrastructure. As TCP SYN flooding attack shows, sender of attack packet generally masquerades as others by spoofing source IP address in the packet. IP network becomes more secure, if backbone network through which IP spoofing packet does not flow can be realized. Egress filtering is a way of not flowing IP spoofing packet into backbone network. Each customer network should activate egress filtering for being an effective stratagem. From not only the view point of IP network security but also suppression of threat to be springboard, egress filter must be applied in all customer networks. However, no tool is ready for easily checking egress filtering. In this paper, we show an egress filter check system which can obtain results of egress filter check on routers in a path to arbitrary host.
引用
收藏
页码:289 / +
页数:2
相关论文
empty
未找到相关数据