Skip to main content

Insights into SAV Implementations in the Internet

  • Conference paper
  • First Online:
Passive and Active Measurement (PAM 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14538))

Included in the following conference series:

  • 118 Accesses

Abstract

Source Address Validation (SAV) is designed to block packets with spoofed IP addresses. Obtaining insights into the deployment and implementation of SAV is essential for understanding the potential impact of attacks that exploit spoofed IP addresses and also poses an interesting research question.

No current approaches for identifying networks that enforce SAV can infer information on the specific SAV techniques employed by the network operators. To address this gap, we present the first study of the SAV implementation techniques: Access Control Lists (ACLs) and unicast Reverse Path Forwarding (uRPF). While uRPF is more effective than ACLs, our large-scale Internet measurement reveals that network operators underutilize uRPF. Our study highlights the need for increased efforts to incentivize uRPF adoption and achieve broader network security benefits.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Inspired by the TCP idle scan, we utilize SYN-ACKs for probes.

  2. 2.

    We utilize random ports to avoid interference with commonly used services such as HTTP and DNS.

  3. 3.

    Our experiments showed that around 70% of the tested counters exhibited an MAE value lower than 10.

  4. 4.

    We consider /24 networks as the smallest measurement unit.

References

  1. Domains Monitor. https://domains-monitor.com/. Accessed 25 Jan 2023

  2. Rapid7 labs. https://opendata.rapid7.com/. Accessed 11 Dec 2022

  3. Fraunhofer AICOS: TSFEL documentation release 0.1.4 (2021). https://tsfel.readthedocs.io/_/downloads/en/development/pdf/. Accessed 2 Nov 2021

  4. Antirez: http://seclists.org/bugtraq/1998/Dec/0079.html. Accessed 16 Jan 2022

  5. Baker, F., Savola, P.: RFC 3704: ingress filtering for multihomed networks (2004)

    Google Scholar 

  6. Beverly, R., Bauer, S.: The Spoofer project: inferring the extent of source address filtering on the internet. In: USENIX SRUTI, vol. 5, pp. 53–59 (2005)

    Google Scholar 

  7. Braden, R.T.: Requirements for internet hosts - communication layers. RFC 1122, October 1989. https://doi.org/10.17487/RFC1122. https://rfc-editor.org/rfc/rfc1122.txt

  8. CAIDA: https://publicdata.caida.org/datasets/as-relationships/serial-1/. Accessed 10 Oct 2023

  9. Chandola, V., Vatsavai, R.R.: A Gaussian process based online change detection algorithm for monitoring periodic time series. In: Proceedings of the 2011 SIAM International Conference on Data Mining, pp. 95–106. SIAM (2011)

    Google Scholar 

  10. Chauhan, S., Vig, L.: Anomaly detection in ECG time signals via deep long short-term memory networks. In: 2015 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 1–7. IEEE (2015)

    Google Scholar 

  11. Dai, T., Shulman, H.: SMap: internet-wide scanning for spoofing. In: Annual Computer Security Applications Conference, pp. 1039–1050 (2021)

    Google Scholar 

  12. Deccio, C., Hilton, A., Briggs, M., Avery, T., Richardson, R.: Behind closed doors: a network tale of spoofing, intrusion, and false DNS security. In: Proceedings of the ACM Internet Measurement Conference, pp. 65–77 (2020)

    Google Scholar 

  13. Durumeric, Z., Wustrow, E., Halderman, J.A.: ZMap: fast internet-wide scanning and its security applications. In: USENIX Security Symposium, vol. 8, pp. 47–53 (2013)

    Google Scholar 

  14. Ensafi, R., Knockel, J., Alexander, G., Crandall, J.R.: Detecting intentional packet drops on the internet via TCP/IP side channels. In: Faloutsos, M., Kuzmanovic, A. (eds.) PAM 2014. LNCS, vol. 8362, pp. 109–118. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-04918-2_11

    Chapter  Google Scholar 

  15. Guo, T., Xu, Z., Yao, X., Chen, H., Aberer, K., Funaya, K.: Robust online time series prediction with recurrent neural networks. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 816–825. IEEE (2016)

    Google Scholar 

  16. Korczyński, M., Nosyk, Y., Lone, Q., Skwarek, M., Jonglez, B., Duda, A.: Don’t forget to lock the front door! Inferring the deployment of source address validation of inbound traffic. In: Sperotto, A., Dainotti, A., Stiller, B. (eds.) PAM 2020. LNCS, vol. 12048, pp. 107–121. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-44081-7_7

    Chapter  Google Scholar 

  17. Kührer, M., Hupperich, T., Rossow, C., Holz, T.: Exit from hell? Reducing the impact of Amplification DDoS attacks. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 111–125 (2014)

    Google Scholar 

  18. Liu, B., Bi, J., Vasilakos, A.V.: Toward incentivizing anti-spoofing deployment. IEEE Trans. Inf. Forensics Secur. 9(3), 436–450 (2014)

    Article  Google Scholar 

  19. Lone, Q., Frik, A., Luckie, M., Korczyński, M., van Eeten, M., Ganán, C.: Deployment of source address validation by network operators: a randomized control trial. In: Proceedings of the IEEE Security and Privacy (S&P) (2022)

    Google Scholar 

  20. Lone, Q., Luckie, M., Korczyński, M., Asghari, H., Javed, M., Van Eeten, M.: Using crowdsourcing marketplaces for network measurements: the case of Spoofer. In: 2018 Network Traffic Measurement and Analysis Conference (TMA), pp. 1–8. IEEE (2018)

    Google Scholar 

  21. Lone, Q., Luckie, M., Korczyński, M., van Eeten, M.: Using loops observed in traceroute to infer the ability to Spoof. In: Kaafar, M.A., Uhlig, S., Amann, J. (eds.) PAM 2017. LNCS, vol. 10176, pp. 229–241. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-54328-4_17

    Chapter  Google Scholar 

  22. Luckie, M., Beverly, R., Koga, R., Keys, K., Kroll, J.A., Claffy, K.: Network hygiene, incentives, and regulation: deployment of source address validation in the internet. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 465–480 (2019)

    Google Scholar 

  23. MANRS: Anti-Spoofing - Preventing traffic with spoofed source IP addresses. https://www.manrs.org/netops/guide/antispoofing/. Accessed 25 Jan 2023

  24. Mauch, J.: Spoofing ASNs. https://seclists.org/nanog/2013/Aug/132. Accessed 25 Jan 2023

  25. Mukaka, M.M.: A guide to appropriate use of correlation coefficient in medical research. Malawi Med. J. 24(3), 69–71 (2012)

    Google Scholar 

  26. NMAP: TCP Idle Scan. https://nmap.org/book/idlescan.html. Accessed 10 Nov 2022

  27. Orevi, L., Herzberg, A., Zlatokrilov, H.: DNS-DNS: DNS-based De-NAT scheme. In: Camenisch, J., Papadimitratos, P. (eds.) CANS 2018. LNCS, vol. 11124, pp. 69–88. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00434-7_4

    Chapter  Google Scholar 

  28. Partridge, C., Allman, M.: Ethical considerations in network measurement papers. Commun. ACM 59(10), 58–64 (2016)

    Article  Google Scholar 

  29. Pearce, P., Ensafi, R., Li, F., Feamster, N., Paxson, V.: Augur: internet-wide detection of connectivity disruptions. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 427–443. IEEE (2017)

    Google Scholar 

  30. Postel, J.: Internet protocol. RFC 791, RFC Editor, September 1981. https://www.rfc-editor.org/info/rfc791

  31. Salutari, F., Cicalese, D., Rossi, D.J.: A closer look at IP-ID behavior in the wild. In: Beverly, R., Smaragdakis, G., Feldmann, A. (eds.) PAM 2018. LNCS, vol. 10771, pp. 243–254. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-76481-8_18

    Chapter  Google Scholar 

  32. Semmlow, J.: The Fourier transform and power spectrum: implications and applications. In: Semmlow, J. (ed.) Signals and Systems for Bioengineers, 2nd edn., pp. 131–165. Biomedical Engineering, Academic Press, Boston (2012). https://doi.org/10.1016/B978-0-12-384982-3.00004-3. https://www.sciencedirect.com/science/article/pii/B9780123849823000043

  33. Senie, D., Ferguson, P.: Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. RFC 2827, May 2000. https://doi.org/10.17487/RFC2827. https://www.rfc-editor.org/info/rfc2827

  34. Sriram, K., Montgomery, D., Haas, J.: RFC 8704 enhanced feasible-path unicast reverse path forwarding (2020)

    Google Scholar 

  35. Touch, D.J.D.: Updated Specification of the IPv4 ID Field. RFC 6864, February 2013. https://doi.org/10.17487/RFC6864. https://rfc-editor.org/rfc/rfc6864.txt

  36. Zhang, X., Knockel, J., Crandall, J.R.: ONIS: inferring TCP/IP-based trust relationships completely off-path. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pp. 2069–2077. IEEE (2018)

    Google Scholar 

Download references

Acknowledgements

This work has been co-funded by the German Federal Ministry of Education and Research and the Hessen State Ministry for Higher Education, Research and Arts within their joint support of the National Research Center for Applied Cybersecurity ATHENE and by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) SFB 1119.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shujie Zhao .

Editor information

Editors and Affiliations

Appendices

A  SVM-Based IPID Classifier

The initial step of SAVscan is to identify global counters from target networks. To achieve this, SAVscan first incorporates an IPID classifier, which is an improvement upon the decision tree (DT) based classifier proposed by Salutari et al. [31]. The latter classifier relies on six features, including the entropy, expectation, and standard deviation of IPID sequences, to distinguish between five categories of IPID implementations. We implement an improved classifier with Support Vector Machine (SVM) model using nine additional features extracted from the time and frequency domains of an IPID time series.

Based on the various IPID assignments in [31], four primary types of IPID time series are outlined: global IPID time series from global counters, per-destination/per-host IPID time series from per-destination counters, random IPID time series from random number generators, constant IPID time series from unchanged IPID allocations. Figures 4 and 5 display four types of IPID time series in the time and frequency domains, respectively, demonstrating noticeable differences between them.

Fig. 4.
figure 4

IPID values of four categories changing over 100 s.

Fig. 5.
figure 5

DFT power spectra over a half frequency period (0, 0.5) Hz.

1.1 A.1  Features

We send N requests to a given IP server at a constant rate of one packet per second (1 pps or 1 Hz), alternately using two unique IP addresses (which can distinguish between global and per-destination counters), and extract IPID values \(x_{n}\) from responses, resulting in an IPID time series, denoted as \((x_{n}, t_{n}), n \in [0, N-1]\).

Let s be the N-length IPID time series, with a and b being the two subsequences collected by two unique addresses. We first extract six features Nwrap(a), \(\varDelta _{max}(s)\), \(\varDelta _{max}(a)\), \(\varDelta _{max}(b)\), \(\overline{\varDelta }(s)\), Autocorr(s) from the time domain, introduced below in detail:

\(Nwrap(\cdot )\): This operator measures the frequency of IPID wraparound (which occurs when the IPID value wraps to zero after reaching \(2^{16}-1\)) in a sequence. For global IPIDs, the feature value depends on the rate of counter increase and approaches zero in a stable network with little or no wraparound during the measurement period. In contrast, for random IPIDs, the feature value approximates 50%, with the extreme case being wraparounds occurring every two seconds.

\(\varDelta _{max}(\cdot )\) and \(\overline{\varDelta }(\cdot )\): We define \(\varDelta x_{n}\) as the difference between two consecutive IPID values to remove the potential periodicity (i.e., the IPID value periodically changes from zero to \(2^{16}-1\)) in IPID samples:

$$\varDelta x_{n} = (x_{n+1} - x_{n} + 2^{16}) \bmod 2^{16}, \qquad n \in [0, N-2]$$

\(\varDelta _{max}(\cdot )\) refers to the maximum difference in a given sequence, while \(\overline{\varDelta }(\cdot )\) means the average difference in an N-length time series:

$$\overline{\varDelta } = \frac{1}{N-1}\sum \nolimits _{n=0}^{N-2}\varDelta x_{n}$$

\(\varDelta _{max}(s)\) or \(\overline{\varDelta }(s)\) will be extremely large for per-destination or random IPIDs because the sequence contains many negative increments between two consecutive IPID values.

\(Autocorr(\cdot )\): This operator measures the linear relationship between a given time series and itself using Pearson’s correlation [25] at lag = 1. Global IPID sequences exhibit a strong positive relationship (Autocorr(s) = +1), whereas per-destination sequences show a negative relationship. We assign a zero value to this feature of constant IPIDs since no correlation is defined for this class. This has no impact on IPID identification, as all other features of this class are also zeros.

Next, we transform the N-sample IPID sequence into frequency components using Discrete Fourier Transform (DFT):

$$X_{k} = \sum \nolimits _{n=0}^{N-1}x_{n}e^{-\frac{i2\pi }{N}kn}, \qquad f_{k} = k\frac{f_{s}}{N}, k \in [0, N-1]$$

where \(X_{k}\) is the \(k_{th}\) element of the DFT and \(f_{k}\) represents its corresponding frequency. We subtract the mean of IPID values in the time domain to eliminate the DC (zero frequency) component in the frequency domain to avoid the effect on the analysis of other frequencies. Three features are selected from the frequency domain:

\(f_{d}\): it refers to the corresponding frequency at the peak of the power spectrum [32]. For per-destination IPIDs, we expect a peak at the frequency of 0.5 Hz (e.g., at a sampling rate of 1 Hz, the per-destination IPID has a period of 2 s).

B: it means the width of the frequency band in which 95% of the total power is located [3]. Ideally, random IPIDs have a broadband spectrum characteristic, while global IPIDs have a narrowband as they only contain low frequencies.

\(f_{rolloff}\): it represents the frequency, under which 85% of the total power lies [3]. The \(f_{rolloff}\) value of global IPIDs is relatively small due to their low frequency properties.

B  Algorithm for IPID Prediction

We display the pseudo-code of our IPID prediction approach in Algorithm 1.

Algorithm 1:
figure a

Pseudo-code of IPID prediction

C  Spoofed Packet Number

We then estimate how many packets need to be sent for the perturbation of the counter to work. Aforementioned, there will be \(\varPhi (\frac{e_{N}-\mu }{\sigma }) \le \alpha \) in the case of successful IPID perturbation. Then we deduce the value of \(n_{s}\) as follows:

$$\frac{e_{N}-\mu }{\sigma } \le \varPhi ^{-1}(\alpha )$$
$$\tilde{e}_{N}-n_{s} \le \varPhi ^{-1}(\alpha )*\sigma + \mu $$
$$n_{s} \ge -\varPhi ^{-1}(\alpha )*\sigma - \mu + \tilde{e}_{N}$$

We use \(e_{max}\), the maximum prediction error in E, as the estimated value of \(\tilde{e}_{N}\) (which equals \(\hat{x}_{N}-x_{N}\), with an ideal value of 0 when MAE is 0) to yield a relatively large \(n_{s}\) value, ensuring the triggering of the anomaly detection. We also ensure that we send at least one spoofed packet. Then, we define \(n_{s} = 1 + \left[ -\varPhi ^{-1}(\alpha )*\sigma - \mu + e_{max}\right] \). To mitigate potential harm to the tested network, we limit the number of spoofed packets sent to 10 during measurement.

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Schulmann, H., Zhao, S. (2024). Insights into SAV Implementations in the Internet. In: Richter, P., Bajpai, V., Carisimo, E. (eds) Passive and Active Measurement. PAM 2024. Lecture Notes in Computer Science, vol 14538. Springer, Cham. https://doi.org/10.1007/978-3-031-56252-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-56252-5_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-56251-8

  • Online ISBN: 978-3-031-56252-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics