Abstract
Computer networks are continually evolving, making the execution of security tasks increasingly complex. Also, the development of new networking environments, such as the Internet Engineering Task Force (IETF) Home Networking (Homenet), usually is not followed by advances in security mechanisms for these environments. In this context, IP Spoofing, the obfuscation of the actual network address of the attacker either to amplify or redirect communications responses to a given target, is an example of network attack that can be employed in several infrastructures. Considering Homenet, the utilization of IPv6 does not avoid such attacks since the Neighbor Discovery Protocol (NDP), which is responsible for neighborhood discovery in IPv6, does not have mechanisms of validation of network and link addresses in its packet header (i.e., source-address validation). The present work proposes a solution to mitigate the use of IP Spoofing attacks originated in a Homenet using Software-Defined Networking (SDN) features. The results from the experimental evaluation demonstrate that the proposed method has desirable properties to avoid such attacks without increasing the complexity of the Homenet architecture.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
NMAP - https://nmap.org/.
References
Bannour, F., Souihi, S., Mellouk, A.: Distributed SDN control: survey, taxonomy, and challenges. IEEE Commun. Surv. Tutor. 20(1), 333–354 (2018). https://doi.org/10.1109/COMST.2017.2782482
Barbhuiya, F., Bansal, G., Kumar, N., Biswas, S., Nandi, S.: Detection of neighbor discovery protocol based attacks in IPv6 network. Netw. Sci. 2(4), 91–113 (2013). https://doi.org/10.1007/s13119.013.0018.2
Chown, T., Arkko, J., Brandt, A., Troan, O., Weil, J.: IPv6 home networking architecture principles. RFC 7368 (Informational), October 2014
da Costa Cordeiro, W.L., Marques, J.A., Gaspary, L.P.: Data plane programmability beyond OpenFlow: opportunities and challenges for network and service operations and management. J. Netw. Syst. Manag. 25(4), 784–818 (2017)
Mars, D., Gammar, S.M., Lahmadi, A., Saidane, L.A.: Using information centric networking in internet of things: a survey. Wirel. Pers. Commun. 105, 1–17 (2019)
Mowla, N., Doh, I., Chae, K.: An efficient defense mechanism for spoofed IP attack in SDN based CDNi. In: Proceedings of the International Conference on Information Networking (ICOIN), pp. 92–97, January 2015. https://doi.org/10.1109/ICOIN.2015.7057863
Sivaraman, V., Gharakheili, H.H., Vishwanath, A., Boreli, R., Mehani, O.: Network-level security and privacy control for smart-home IoT devices. In: 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 163–167, October 2015. https://doi.org/10.1109/WiMOB.2015.7347956
Xu, K., Wang, F., Egli, R., Fives, A., Howell, R., Mcintyre, O.: Object-oriented big data security analytics: a case study on home network traffic. In: Cai, Z., Wang, C., Cheng, S., Wang, H., Gao, H. (eds.) WASA 2014. LNCS, vol. 8491, pp. 313–323. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-07782-6_29
Yan, Z., Deng, G., Wu, J.: SAVI-based IPv6 source address validation implementation of the access network. In: 2011 International Conference on Proceedings of Computer Science and Service System (CSSS), pp. 2530–2533, June 2011. https://doi.org/10.1109/CSSS.2011.5974125
Yao, G., Bi, J., Xiao, P.: Source address validation solution with OpenFlow/NOX architecture. In: 2011 19th IEEE International Conference on Proceedings of Network Protocols (ICNP), pp. 7–12, October 2011. https://doi.org/10.1109/ICNP.2011.6089085
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Ramos, M.F., Dalmazo, B.L., Nobre, J.C. (2019). A Proposal for IP Spoofing Mitigation at Origin in Homenet Using Software-Defined Networking. In: Misra, S., et al. Computational Science and Its Applications – ICCSA 2019. ICCSA 2019. Lecture Notes in Computer Science(), vol 11619. Springer, Cham. https://doi.org/10.1007/978-3-030-24289-3_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-24289-3_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24288-6
Online ISBN: 978-3-030-24289-3
eBook Packages: Computer ScienceComputer Science (R0)