Skip to main content

A Proposal for IP Spoofing Mitigation at Origin in Homenet Using Software-Defined Networking

  • Conference paper
  • First Online:
Book cover Computational Science and Its Applications – ICCSA 2019 (ICCSA 2019)

Abstract

Computer networks are continually evolving, making the execution of security tasks increasingly complex. Also, the development of new networking environments, such as the Internet Engineering Task Force (IETF) Home Networking (Homenet), usually is not followed by advances in security mechanisms for these environments. In this context, IP Spoofing, the obfuscation of the actual network address of the attacker either to amplify or redirect communications responses to a given target, is an example of network attack that can be employed in several infrastructures. Considering Homenet, the utilization of IPv6 does not avoid such attacks since the Neighbor Discovery Protocol (NDP), which is responsible for neighborhood discovery in IPv6, does not have mechanisms of validation of network and link addresses in its packet header (i.e., source-address validation). The present work proposes a solution to mitigate the use of IP Spoofing attacks originated in a Homenet using Software-Defined Networking (SDN) features. The results from the experimental evaluation demonstrate that the proposed method has desirable properties to avoid such attacks without increasing the complexity of the Homenet architecture.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    NMAP - https://nmap.org/.

References

  1. Bannour, F., Souihi, S., Mellouk, A.: Distributed SDN control: survey, taxonomy, and challenges. IEEE Commun. Surv. Tutor. 20(1), 333–354 (2018). https://doi.org/10.1109/COMST.2017.2782482

    Article  Google Scholar 

  2. Barbhuiya, F., Bansal, G., Kumar, N., Biswas, S., Nandi, S.: Detection of neighbor discovery protocol based attacks in IPv6 network. Netw. Sci. 2(4), 91–113 (2013). https://doi.org/10.1007/s13119.013.0018.2

    Article  Google Scholar 

  3. Chown, T., Arkko, J., Brandt, A., Troan, O., Weil, J.: IPv6 home networking architecture principles. RFC 7368 (Informational), October 2014

    Google Scholar 

  4. da Costa Cordeiro, W.L., Marques, J.A., Gaspary, L.P.: Data plane programmability beyond OpenFlow: opportunities and challenges for network and service operations and management. J. Netw. Syst. Manag. 25(4), 784–818 (2017)

    Article  Google Scholar 

  5. Mars, D., Gammar, S.M., Lahmadi, A., Saidane, L.A.: Using information centric networking in internet of things: a survey. Wirel. Pers. Commun. 105, 1–17 (2019)

    Article  Google Scholar 

  6. Mowla, N., Doh, I., Chae, K.: An efficient defense mechanism for spoofed IP attack in SDN based CDNi. In: Proceedings of the International Conference on Information Networking (ICOIN), pp. 92–97, January 2015. https://doi.org/10.1109/ICOIN.2015.7057863

  7. Sivaraman, V., Gharakheili, H.H., Vishwanath, A., Boreli, R., Mehani, O.: Network-level security and privacy control for smart-home IoT devices. In: 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 163–167, October 2015. https://doi.org/10.1109/WiMOB.2015.7347956

  8. Xu, K., Wang, F., Egli, R., Fives, A., Howell, R., Mcintyre, O.: Object-oriented big data security analytics: a case study on home network traffic. In: Cai, Z., Wang, C., Cheng, S., Wang, H., Gao, H. (eds.) WASA 2014. LNCS, vol. 8491, pp. 313–323. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-07782-6_29

    Chapter  Google Scholar 

  9. Yan, Z., Deng, G., Wu, J.: SAVI-based IPv6 source address validation implementation of the access network. In: 2011 International Conference on Proceedings of Computer Science and Service System (CSSS), pp. 2530–2533, June 2011. https://doi.org/10.1109/CSSS.2011.5974125

  10. Yao, G., Bi, J., Xiao, P.: Source address validation solution with OpenFlow/NOX architecture. In: 2011 19th IEEE International Conference on Proceedings of Network Protocols (ICNP), pp. 7–12, October 2011. https://doi.org/10.1109/ICNP.2011.6089085

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bruno L. Dalmazo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ramos, M.F., Dalmazo, B.L., Nobre, J.C. (2019). A Proposal for IP Spoofing Mitigation at Origin in Homenet Using Software-Defined Networking. In: Misra, S., et al. Computational Science and Its Applications – ICCSA 2019. ICCSA 2019. Lecture Notes in Computer Science(), vol 11619. Springer, Cham. https://doi.org/10.1007/978-3-030-24289-3_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24289-3_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24288-6

  • Online ISBN: 978-3-030-24289-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics