Skip to main content

Using Loops Observed in Traceroute to Infer the Ability to Spoof

  • Conference paper
  • First Online:
Passive and Active Measurement (PAM 2017)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 10176))

Included in the following conference series:

Abstract

Despite source IP address spoofing being a known vulnerability for at least 25 years, and despite many efforts to shed light on the problem, spoofing remains a popular attack method for redirection, amplification, and anonymity. To defeat these attacks requires operators to ensure their networks filter packets with spoofed source IP addresses, known as source address validation (SAV), best deployed at the edge of the network where traffic originates. In this paper, we present a new method using routing loops appearing in traceroute data to infer inadequate SAV at the transit provider edge, where a provider does not filter traffic that should not have come from the customer. Our method does not require a vantage point within the customer network. We present and validate an algorithm that identifies at Internet scale which loops imply a lack of ingress filtering by providers. We found 703 provider ASes that do not implement ingress filtering on at least one of their links for 1,780 customer ASes. Most of these observations are unique compared to the existing methods of the Spoofer and Open Resolver projects. By increasing the visibility of the networks that allow spoofing, we aim to strengthen the incentives for the adoption of SAV.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. CAIDA spoofer project. https://spoofer.caida.org/

  2. Mutually Agreed Norms for Routing Security (MANRS). https://www.routingmanifesto.org/manrs/

  3. Open Resolver Project. http://openresolverproject.org/

  4. Augustin, B., Cuvellier, X., Orgogozo, B., Viger, F., Friedman, T., Latapy, M., Magnien, C., Teixeira, R.: Avoiding traceroute anomalies with Paris traceroute. In: IMC, pp. 153–158, October 2006

    Google Scholar 

  5. Baker, F., Savola, P.: Ingress filtering for multihomed networks. RFC 3704, IETF BCP84, March 2004

    Google Scholar 

  6. Bellovin, S.: Security problems in the TCP/IP protocol suite. CCR 19(2), 32–48 (1989)

    Google Scholar 

  7. Beverly, R., Bauer, S.: The spoofer project: inferring the extent of source address filtering on the Internet. In: Proceedings of USENIX SRUTI, July 2005

    Google Scholar 

  8. Beverly, R., Berger, A., Hyun, Y., claffy, k.: Understanding the efficacy of deployed Internet source address validation. In: IMC, pp. 356–369, November 2009

    Google Scholar 

  9. Beverly, R., Koga, R., claffy, kc.: Initial longitudinal analysis of IP source spoofing capability on the Internet, July 2013. http://www.internetsociety.org/

  10. Bright, P.: Spamhaus DDoS grows to Internet-threatening size, March 2013

    Google Scholar 

  11. Ferguson, P., Senie, D.: Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. RFC 2827, IETF BCP38, May 2000

    Google Scholar 

  12. Francois, P., Bonaventure, O.: Avoiding transient loops during IGP convergence in IP networks. In: INFOCOM, pp. 237–247, March 2005

    Google Scholar 

  13. Huffaker, B., Keys, K., Koga, R., claffy, kc.: CAIDA inferred AS to organization mapping dataset. https://www.caida.org/data/as-organizations/

  14. KĂŒhrer, M., Hupperich, T., Rossow, C., Holz, T.: Exit from hell? Reducing the impact of amplication DDoS attacks. In: USENIX Security, August 2014

    Google Scholar 

  15. Luckie, M.: Scamper: a scalable and extensible packet prober for active measurement of the Internet. In: IMC, pp. 239–245, November 2010

    Google Scholar 

  16. Luckie, M., Dhamdhere, A., Huffaker, B., Clark, D., claffy, k.: bdrmap: inference of borders between IP networks. In: IMC, pp. 381–396, November 2016

    Google Scholar 

  17. Luckie, M., Huffaker, B., Dhamdhere, A., Giotsas, V., claffy, k.: AS relationships, customer cones, and validation. In: IMC, pp. 243–256, October 2013

    Google Scholar 

  18. Marder, A., Smith, J.M.: MAP-IT: multipass accurate passive inferences from traceroute. In: IMC, November 2016

    Google Scholar 

  19. Prince, M.: Technical details behind a 400 Gbps NTP amplification DDoS attack. http://blog.cloudflare.com/

  20. Vixie, P.: Rate-limiting state: the edge of the Internet is an unruly place. ACM Queue 12(2), 1–5 (2014)

    Article  Google Scholar 

  21. Xia, J., Gao, L., Fei, T.: A measurement study of persistent forwarding loops on the Internet. Comput. Netw. 51(17), 4780–4796 (2007)

    Article  MATH  Google Scholar 

Download references

Acknowledgments

The technique in this paper is based on an idea from Jared Mauch. Christian Keil (DFN-CERT) provided informative feedback. This work was partly funded by the EU Advanced Cyber Defence Centre (ACDC) project CIP-ICT-PSP.2012.5.1 #325188. This material is based on research sponsored by the Department of Homeland Security (DHS) Science and Technology Directorate, Homeland Security Advanced Research Projects Agency, Cyber Security Division BAA HSHQDC-14-R-B0005, and the Government of United Kingdom of Great Britain and Northern Ireland via contract number D15PC00188.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qasim Lone .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Lone, Q., Luckie, M., KorczyƄski, M., van Eeten, M. (2017). Using Loops Observed in Traceroute to Infer the Ability to Spoof. In: Kaafar, M., Uhlig, S., Amann, J. (eds) Passive and Active Measurement. PAM 2017. Lecture Notes in Computer Science(), vol 10176. Springer, Cham. https://doi.org/10.1007/978-3-319-54328-4_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-54328-4_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-54327-7

  • Online ISBN: 978-3-319-54328-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics