Understanding the efficacy of deployed internet source address validation filtering

  • Authors:
  • Robert Beverly;Arthur Berger;Young Hyun;k claffy

  • Affiliations:
  • Massachusettes Institute of Technology, Cambridge, MA, USA;Massachusettes Institute of Technology, Cambridge, MA, USA;CAIDA, La Jolla, CA, USA;CAIDA, La Jolla, CA, USA

  • Venue:
  • Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

IP source address forgery, or "spoofing," is a long-recognized consequence of the Internet's lack of packet-level authenticity. Despite historical precedent and filtering and tracing efforts, attackers continue to utilize spoofing for anonymity, indirection, and amplification. Using a distributed infrastructure and approximately 12,000 active measurement clients, we collect data on the prevalence and efficacy of current best-practice source address validation techniques. Of clients able to test their provider's source-address filtering rules, we find 31% able to successfully spoof an arbitrary, routable source address, while 77% of clients otherwise unable to spoof can forge an address within their own /24 subnetwork. We uncover significant differences in filtering depending upon network geographic region, type, and size. Our new tracefilter tool for filter location inference finds 80% of filters implemented a single IP hop from sources, with over 95% of blocked packets observably filtered within the source's autonomous system. Finally, we provide initial longitudinal results on the evolution of spoofing revealing no mitigation improvement over four years of measurement. Our analysis provides an empirical basis for evaluating incentive and coordination issues surrounding existing and future Internet packet authentication strategies.