skip to main content
10.1145/3491396.3506531acmconferencesArticle/Chapter ViewAbstractPublication PagesiceaConference Proceedingsconference-collections
research-article

In-band Network Telemetry Based Fine-Grained Traceability Against IP Address Spooling Attack

Authors Info & Claims
Published:07 January 2022Publication History

ABSTRACT

Address spoofing is a thorny problem encountered in the development of the Internet. The governance of address spoofing attacks includes tracking the location of the attacker in response to subsequent attacks. In this article, based on in-band telemetry, we propose a backtracking scheme for address spoofing flows, design a telemetry header for recording the forwarding path, and provide a fine-grained backtracking function embedded in the telemetry header. We analyze the throughput of each network from the telemetry data, and initially predict the source of address spoofing. We conducted experiments to test the feasibility and accuracy of telemetry traceability, and analyzed the overhead of the finegrained traceability mechanism. Experiments show that our method takes up low overhead costs while ensuring traceability and accuracy.

References

  1. AWS. "Threat Landscape Report", https://aws-shield-tlr.s3.amazonaws.com/2020-Q1_AWS_Shield_TLR.pdf/, 2020, [on-line; accessed Oct. 12, 2021]Google ScholarGoogle Scholar
  2. Google, "Google stops biggest-ever DDoS cyber attack to date" https://cloud.google.com/blog/products/identity-security/identifying-and protecting-against-the-largest-ddos-attacks/,2020,[Online; accessed Oct. 14, 2021].Google ScholarGoogle Scholar
  3. M. Wang, B. Li and Z. Li, "sFlow: towards resource-efficient and agile service federation in service overlay networks," 24th International Conference on Distributed Computing Systems, 2004. Proceedings., 2004, pp. 628--635, doi: 10.1109/ICDCS.2004.1281630.Google ScholarGoogle Scholar
  4. Weiwei Z, Jian G, Wenjie G, et al.. NetFlow-based network traffic monitoring//13th Asia-Pacific Network Operations and Management Symposium, APNOMS 2011, Taipei, Taiwan, September 21-23, 2011. IEEE, 2011Google ScholarGoogle Scholar
  5. G. Li et al., "NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering," 2019 IEEE 27th International Conference on Network Protocols (ICNP), 2019, pp. 1--12, doi: 10.1109/ICNP.2019.8888057.Google ScholarGoogle Scholar
  6. Bosshart, P., Daly, D., Izzard, M., Mckeown, N., Rexford, J., & Talayco, D., et al. (2013). Programming protocol-independent packet processors.Google ScholarGoogle Scholar
  7. Kaljic, E., Maric, A., Njemcevic, P., & Hadzialic, M. (2019). A survey on data plane flexibility and programmability in software-defined networking. IEEE Access, 7, 47804--47840.Google ScholarGoogle ScholarCross RefCross Ref
  8. Changhoon Kim, Anirudh Sivaraman, Naga Katta, Antonin Bas, Ad-wait Dixit, and Lawrence J. Wobker. In-band network telemetry via programmable data planes[C]// ACM SIGCOMM Symposium on SDN Research (SOSR), 2015.Google ScholarGoogle Scholar
  9. C. Kim et al.. In-band network telemetry (INT), Tech. Spec., Jun. 2016. [Online]. Available: https://p4.org/assets/INT-current-spec.pdfGoogle ScholarGoogle Scholar
  10. Liu Z, Bi J, Zhou Y, et al. Netvision: Towards network telemetry as a service[C]//2018 IEEE 26th International Conference on Network Protocols (ICNP). IEEE, 2018: 247--248.Google ScholarGoogle Scholar
  11. P. Ferguson and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing", RFC 2827, May 2000.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. H. Burch and B. Cheswick, "Tracing anonymous packets to their approximate source", Proceedings of 14th Systems Administration Conference, 2000.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Abdullah Yasin Nur and Mehmet Engin Tozal, "Record route IP traceback: Combating DoS attacks and the variants", Computers & Security, vol. 72, pp. 13--25, January 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A.C. Snoeren, C. Alex, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, et al., "Single-packet IP traceback", IEEE/ACM Transactions on Networking, vol. 10, pp. 721--734, December 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Mankin, D. Massey and C. Wu, "On Design and Evaluation of Intension-driven ICMP Traceback", IEEE International Conference on Computer Communicati ons and networks, pp. 159--165, October 2001.Google ScholarGoogle Scholar
  16. C. Gong and K. Sarac, "A more practical approach for single-packet IP traceback using packet logging and marking", IEEE Transaction on Parallel and Distributed Systems, vol. 19, pp. 1310--1324, October 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. In-band Network Telemetry Based Fine-Grained Traceability Against IP Address Spooling Attack

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ACM ICEA '21: Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications
      December 2021
      241 pages
      ISBN:9781450391603
      DOI:10.1145/3491396

      Copyright © 2021 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 January 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)34
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader