Publication Details
Detecting IP-spoofing by modelling history of IP address entry points
IP spoofing detection, entry points, network modeling
Since most of the networks do not apply source IP filtering rules to its outgoing
traffic an attacker may insert an arbitrary source IP address in an outgoing
packet, so called IP-spoofing.
This paper elaborates on a possibility to detect IP spoofing in networks with
more than one entry point. A novel detection scheme is proposed. It is based on
an analysis of NetFlow data collected at the entry points.The scheme assumes that
the network traffic originating from a certain source network enters the observed
network via relatively stable set of points which is lower than the total number
of entry points.
The scheme has been tested on data from a real network.
@inproceedings{BUT103465,
author="Michal {Kováčik} and Michal {Kajan} and Martin {Žádník}",
title="Detecting IP-spoofing by modelling history of IP address entry points",
booktitle="Emerging Management Mechanisms for the Future Internet",
year="2013",
series="Lecture Notes in Computer Science",
journal="Lecture Notes in Computer Science",
volume="7943",
number="06",
pages="73--83",
publisher="Springer Verlag",
address="Barcelona",
doi="10.1007/978-3-642-38998-6\{_}9",
isbn="978-3-642-38997-9",
issn="0302-9743",
url="https://www.fit.vut.cz/research/publication/10271/"
}