Case Study: Monitoring IP Spoofing

Improved Essays
4. CONTROLLING IP SPOOFING
IP addresses are unique addresses used to identify a node on the network. But the attackers have been able to fake or spoof their IP addresses masquerading as someone else while they do the malicious work, and this in a sense defeats the point of having an address system for uniquely identifying everyone. Thus considerable research is being carried out to detect such digital impostors and reveal at the very least stop them from accessing the resource if the spoofing can’t be stopped. IP spoofing is very popular for reasons like it makes discerning of attack traffic from legit one extremely difficult and it also makes it difficult to pinpoint the true attacker. IP spoofing is used by many DDOS attacks because to the
…show more content…
The solution to this problem leverages the same loophole as the one leveraged by attackers; the source address of the packet can be spoofed but the attacker has no control over the route that the packet will take. Hence it is this key observation that made the solution possible, that is analyze what can’t be manipulated by the attacker; the route. Now if a system knows about the best path from a given source to any destination and if it also has some information about the global topology, it can easily analyze the route a packet took and immediately decide if it really originated from the address that it claims to be. If a packet is genuine, it must have followed the best path but if the path is different. It means that the packet originated from somewhere else and that is why it didn’t take the expected best path. The only disadvantage to this system is that it is not feasible on path vector based routing system. A path vector protocol is a computer network routing protocol which maintains the path information that gets updated dynamically. Updates which have looped through the network and returned to the same node are easily detected and discarded [3]. Now current Internet uses BGP which is in essence a path vector …show more content…
The internet consists of a large number of network domains that are called autonomous systems (AS). Autonomous Systems provide internet access to servers and to one another based on the relationships between autonomous systems. These relationships can be broken down into three main categories:
• Provider-Customer relationship: In this relationship the customer pays the provider to carry his/her traffic to and fro the provider’s network. The network providers’ networks are generally quite huge and they offer their networks to carry customer’s traffic in return for fees. An example would be the Internet Service Providers (ISPs) and mobile network companies.
• Peer-to-peer relationship: In this type of relationship two networks agree to carry each other’s traffic and their customer’s traffic. Since they both carry each other’s traffic, they don’t have to pay each other. This is usually done by network systems of about the same sizes and network providers do this to increase their reach to more customers which would have been far more expensive for both providers if they would have tried to do it individually. Many cellphone service providers make contracts to carry each other’s data so that they can provide services to their customers even in regions where they don’t have cell towers but the other company has, and in return they carry the other company’s traffic from regions where the other one doesn’t

Related Documents

  • Decent Essays

    Nt1310 Unit 1 Exercise 1

    • 551 Words
    • 3 Pages

    In this section the fast-recovery algorithm that makes TCP NewReno[1] perform better than the Reno[3], is described. During congestion avoidance if the sender receives triple duplicate ACKs, then it performs fast-retransmission and enters into fast-recovery. In fast-retransmit the sender retransmits the lost segment,sets the threshold value for slow-start as ssthresh = cwnd/2, and sets congestion window, cwnd = ssthresh+3 segments. In fast-recovery, the sender increases its congestion window by one segment for each subsequent duplicate ACK received that indicates a segment is reaching the destination. It can transmit new segments if permitted by its congestion window.…

    • 551 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    A routing loop is a situation that occurs between two or more routers in which a packet is continuously routed between the routers as a result of irregularities from the routing algorithms and/or the routing tables of the routers. (routing loops, 2015). An example is when three routers are connected in a triangular pattern i.e. router A is connected to router B, router B is connected to router C and router C is connected to router A, when the network is converged, all three routers will have sent their routing tables to their neighbors. If router C goes down and router B tries to send a packet to C at the same time the router went down before it receives an updated table from router A, it will look into its routing table and it sees that router A can get to C, so it will update its route to C through A and will send the packet through router A. the same thing happens when router A receives the packet from router B, since it received no update on a change from B, it also checks its table and sees that B can get to C, so it updates its route to C through B and sends the packet to B and the packet keeps getting sent this way until the maximum hop count is reached…

    • 677 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 3 Case Study

    • 305 Words
    • 2 Pages

    In round and robin mechanism it allocate IP address to the requested client as per the availability and making the server highly available . Answer 4:- "in.addr-arpa" is used to remove the obstruction to subnet on non-octet boundaries. Thus making it possible to assign IP address in smaller octet then 24 bit prefix without losing the ability to delegate authority for in.addr-arpa mapping.…

    • 305 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    If the server sends a file to the receiver, and it receives it near the end of the packet lifetime, then the ACK may take longer to receive then what is left on the packet lifetime, so the server may send another packet before it receives the ACK leading to duplicate packets. 4.Give one potential disadvantage when Nagle's algorithm is used on a badly congested network. A big problem can occur when Nagle's algorithm is used alongside Delayed ACK, another method used to help prevent congestion which could possibly be used on a badly congested network. Basically there is a chance that they will work against each other, Nagle's algorithm won't send it's last packet unless it gets an ACK, but the delayed ACK won't be sent because the server still doesn't have all the data it needs.…

    • 412 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The following are the top 10 types of packets: IPv4: Internet Protocol version 4 (IPv4) is the standard version of the internet protocol, that acts as the platform for standard internet protocols and existing internet models (ISP). Extensive use of this protocol led to exhaustion of IP addresses. Therefore, we are bound to use IPv6, in the near future. A feature called as sub-netting is used for IP address allocation. It is defined in RFC 791.…

    • 917 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Study Guide

    • 809 Words
    • 4 Pages

    Route poisoning 3. Hold-down timer Explain two of the above techniques briefly with diagrams. SOLUTION…

    • 809 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    ¥ 1. An IP address is an identifier for devices on a TCP/IP network. Usually, an IP address could be assigned using a 32-bit numeric address written as four numbers separated by periods. Each number can go from being zero to 255. For example, 1.160.10.240 could be an IP address.…

    • 611 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1210 Chapter 7 Summary

    • 1348 Words
    • 6 Pages

    (3) When traffic becomes heavy on a circuit-switching network, some calls are jammed; that is, the network refuses to accept additional connection requests until the load on the network diminishes. 9.5 In the datagram approach, each packet is treated independently, with no reference to packets that have been out before. In the virtual circuit method, a preplanned path is established before any packets are sent. Once the path is established, all the packets between a pair of communicating parties follow this same route through the network.…

    • 1348 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Final Project

    • 1035 Words
    • 5 Pages

    Introduction…………………………………………………………………………….. 3 2. Virtual Private Network (VPN)……………………………………………………….... 3 3. Classification…………………………………………………………………………....…

    • 1035 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    This paper describes about the notion of Free Wi-Fi in New York City, which is called LinkNYC and elaborates the system in terms of its network configuration. The network diagram will be provided to illustrate the overall system. Moreover, identifying the cost associates in this project. Most important, expounding how this system could affect towards marketing for smartphone users. Introduction…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Attackers are persistent and will continue until they reach their…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Denial-Of-Service Attack

    • 756 Words
    • 4 Pages

    “Denial-of-Service attacks are the cyber equivalent of vandalism. Rather than seek to break into the target system, the perpetrator simply wishes to render the target system unusable” (Easttom, Taylor, 2011). This type of cybercrime prevents the end users from attaining the resource accessibility. Denial-of-Service is also known as a DOS. An attack was launched in Santa Cruz County website in California that caused “county’s government entities and programs, including Emergency Services, Law Enforcement, the Courts, Social Services, Agricultural Extension, Employment, Surplus Sales, Vendor Registration, and Construction Projects and Proposals”( U.S. Attorney’s Office,2011).…

    • 756 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Texas Internet Advantages

    • 326 Words
    • 2 Pages

    Enjoy The Fastest And The Craziest Speed Of Internet In Texas Like food, like water, like air, the very indispensable requirement for survival. But according to the modern day theory, internet accessibility does finds its place among the vital components of human. An undeniable fact that usage of internet has its own never ending list of utility and advantages in different field. Despite of so many service providers, it becomes an utter confusion to find and approach someone who can offer incredibly fair speed with good subscription cost, which also doesn’t burn our pocket.…

    • 326 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Lab 4.3

    • 653 Words
    • 3 Pages

    5.1.4.3 Lab — Using Wireshark to Examine Ethernet Frames Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Part 1: Examine the Header Fields in an Ethernet II Frame What is significant about the contents of the destination address field? It starts with the broadcast ARP protocol from the router asking who has 192.168.2.22.…

    • 653 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    As computers became essential to business, industry, trades, and professions, educators and parents became increasingly concerned that young people acquire at minimum the basic understanding of computers and master the related skills. 2. Explain computer algorithms and its significance An algorithm is a set of instructions designed to perform a specific task. In computer science, an algorithm is a set of steps for a computer application to accomplish a task.…

    • 790 Words
    • 4 Pages
    Improved Essays