Network hygiene, incentives, and regulation: deployment of source address validation in the internet
The Spoofer project has collected data on the deployment and characteristics of IP source
address validation on the Internet since 2005. Data from the project comes from participants …
address validation on the Internet since 2005. Data from the project comes from participants …
Bamboozling certificate authorities with {BGP}
The Public Key Infrastructure (PKI) protects users from malicious man-in-the-middle attacks
by having trusted Certificate Authorities (CAs) vouch for the domain names of servers on the …
by having trusted Certificate Authorities (CAs) vouch for the domain names of servers on the …
Routing loops as mega amplifiers for dns-based ddos attacks
DDoS attacks are one of the biggest threats to the modern Internet as their magnitude is
constantly increasing. They are highly effective because of the amplification and reflection …
constantly increasing. They are highly effective because of the amplification and reflection …
Deployment of source address validation by network operators: a randomized control trial
IP spoofing, sending IP packets with a false source IP address, continues to be a primary
attack vector for large-scale Denial of Service attacks. To combat spoofing, various …
attack vector for large-scale Denial of Service attacks. To combat spoofing, various …
Detection, classification, and analysis of inter-domain traffic with spoofed source IP addresses
F Lichtblau, F Streibelt, T Krüger, P Richter… - Proceedings of the …, 2017 - dl.acm.org
IP traffic with forged source addresses (ie, spoofed traffic) enables a series of threats ranging
from the impersonation of remote hosts to massive denial-of-service attacks. Consequently …
from the impersonation of remote hosts to massive denial-of-service attacks. Consequently …
Don't forget to lock the front door! inferring the deployment of source address validation of inbound traffic
This paper concerns the problem of the absence of ingress filtering at the network edge, one
of the main causes of important network security issues. Numerous network operators do not …
of the main causes of important network security issues. Numerous network operators do not …
Study on domain name system (dns) abuse: Technical report
A safe and secure Domain Name System (DNS) is of paramount importance for the digital
economy and society. Malicious activities on the DNS, generally referred to as" DNS abuse" …
economy and society. Malicious activities on the DNS, generally referred to as" DNS abuse" …
[PDF][PDF] Saving the internet: Explaining the adoption of source address validation by internet service providers
Spoofed Internet traffic is used by miscreants, most visibly for amplification DDoS attacks.
Source Address Validation (SAV) by network operators is a security best practice to stop …
Source Address Validation (SAV) by network operators is a security best practice to stop …
Source address validation
M Korczyński, Y Nosyk - Encyclopedia of Cryptography, Security and …, 2021 - Springer
Background The Internet relies on IP packets to enable communication between hosts with
the destination and source addresses specified in packet headers. However, there is no …
the destination and source addresses specified in packet headers. However, there is no …
Challenges in inferring spoofed traffic at IXPs
Ascertaining that a network will forward spoofed traffic usually requires an active probing
vantage point in that network, effectively preventing a comprehensive view of this global …
vantage point in that network, effectively preventing a comprehensive view of this global …