Result Details
Detecting IP-spoofing by modelling history of IP address entry points
Kajan Michal, Ing., DCSY (FIT)
Žádník Martin, Ing., Ph.D., DCSY (FIT)
Since most of the networks do not apply source IP filtering rules to its outgoing traffic an attacker may insert an arbitrary source IP address in an outgoing packet, so called IP-spoofing.
This paper elaborates on a possibility to detect IP spoofing in networks with more than one entry point. A novel detection scheme is proposed. It is based on an analysis of NetFlow data collected at the entry points.The scheme assumes that the network traffic originating from a certain source network enters the observed network via relatively stable set of points which is lower than the total number of entry points.
The scheme has been tested on data from a real network.
IP spoofing detection, entry points, network modeling
@inproceedings{BUT103465,
author="Michal {Kováčik} and Michal {Kajan} and Martin {Žádník}",
title="Detecting IP-spoofing by modelling history of IP address entry points",
booktitle="Emerging Management Mechanisms for the Future Internet",
year="2013",
series="Lecture Notes in Computer Science",
journal="Lecture Notes in Computer Science",
volume="7943",
number="06",
pages="73--83",
publisher="Springer Verlag",
address="Barcelona",
doi="10.1007/978-3-642-38998-6\{_}9",
isbn="978-3-642-38997-9",
issn="0302-9743",
url="https://www.fit.vut.cz/research/publication/10271/"
}
Centrum excelence IT4Innovations, MŠMT, Operační program Výzkum a vývoj pro inovace, ED1.1.00/02.0070, start: 2011-01-01, end: 2015-12-31, completed
Modern Tools for Detection and Mitigation of Cyber Criminality on the New Generation Internet, MV, Program bezpečnostního výzkumu České republiky 2010 - 2015, VG20102015022, start: 2010-10-01, end: 2015-09-30, completed
Security-Oriented Research in Information Technology, MŠMT, Institucionální prostředky SR ČR (např. VZ, VC), MSM0021630528, start: 2007-01-01, end: 2013-12-31, running