Initial longitudinal analysis of IP source spoofing capability on the Internet
MetadataShow full item record
The Spoofer project originated in 2005 as the results of discussions over the general ability to send spoofed-sourced IP packets across the Internet. At the time, a common misconception was that "most networks perform source address filtering, and, even if they don't, botnets remove any of the anonymity advantage afforded by spoofing". Such beliefs of course proved incorrect in light of a rash of spoofing-based denial-of-service attacks -- attacks that still occur to this day. Despite IP source spoofing being a known vunerability for at least 25 years, and despite many efforts to shed light on the problem, spoofing remains a viable attack vector for redirection, amplification, and anonymity as evidenced most recently and publicly in May 2013 during a 300+ Gb/s DDoS attack against Spamhaus.
Showing items related by title, author, creator and subject.
Custy, John; Rowe, Neil C. (Monterey, California. Naval Postgraduate School, 2008-06);This paper describes how basic concepts from information theory can be used to analyze deception. We show how a general definition of deception can be mapped to a simple communication model known as a Z-channel, and we ...
Unknown author (Monterey, California: Naval Postgraduate School., 2014);What: The Spoofer project measures the Internet's susceptibility to spoofed source address IP packets. Malicious users capitalize on the ability to "spoof" source IP addresses for anonymity, indirection, targeted attacks ...
Courtney, David W. (Monterey, California: Naval Postgraduate School, 2016-09);The ability to securely disseminate data in a timely manner is critical to military missions within a hostile environment. Tactical wireless sensor networks (WSN) consist of power-constrained devices spread throughout a ...