Defense against spoofed IP traffic using hop-count filtering

被引:159
作者
Wang, Haining [1 ]
Jin, Cheng
Shin, Kang G.
机构
[1] Coll William & Mary, Williamsburg, VA 23187 USA
[2] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
[3] CALTECH, Pasadena, CA 91125 USA
基金
美国国家科学基金会;
关键词
DDoS attacks; IP spoofing; hop-count; host-based;
D O I
10.1109/TNET.2006.890133
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
IP spoofing has often been exploited by Distributed Denial of Service (DDoS) attacks to: 1) conceal flooding sources and dilute localities in flooding traffic, and 2) coax legitimate hosts into becoming reflectors, redirecting and amplifying flooding traffic. Thus, the ability to filter spoofed IP packets near victim servers is essential to their own protection and prevention of becoming involuntary DoS reflectors. Although an attacker can forge any field in the IP header, he cannot falsify the number of hops an IP packet takes to reach its destination. More importantly, since the hop-count values are diverse, an attacker cannot randomly spoof IP addresses while maintaining consistent hop-counts. On the other hand, an Internet server can easily infer the hop-count information from the Time-to-Live (TTL) field of the IP header. Using a mapping between IP addresses and their hop-cotints, the server can distinguish spoofed IP packets from legitimate ones. Based on this observation, we present a novel filtering technique, called Hop-Count Filtering (HCF)-which builds an accurate IP-to-hop-count (IP2HC) mapping table-to detect and discard spoofed IP packets. HCF is easy to deploy, as it does not require any support from the underlying network. Through analysis using network measurement data, we show that HCF can identify close to 90% of spoofed IP packets, and then discard them with little collateral damage. We implement and evaluate,HCF in the Linux kernel, demonstrating its effectiveness with experimental measurements.
引用
收藏
页码:40 / 53
页数:14
相关论文
共 50 条
  • [1] [Anonymous], 2003, 2003 C APPL TECHNOLO, P99, DOI 10.1145/863955.863968
  • [2] [Anonymous], P SIGCOMM 03
  • [3] [Anonymous], 2001, ACM
  • [4] [Anonymous], 2000, P 2000 ACM SIGCOMM C
  • [5] [Anonymous], NATURE
  • [6] *ARB NETW INC, 2002, PEAKFL DOS I002 ONL
  • [7] Banga Gaurav, 1999, P 3 S OP SYST DES IM, P45
  • [8] BELLOVIN SM, 2000, UNPUB ICMP TRACEBACK
  • [9] Bernstein D. J., LINUX KERNEL SYN COO
  • [10] Web server support for tiered services
    Bhatti, N
    Friedrich, R
    [J]. IEEE NETWORK, 1999, 13 (05): : 64 - 71