Presentation 2006-06-23
Efficient detection of IP spoofed packets by making use of network topology information
Toshinori OTSUKA, Fumitaka NAKAMURA, Yuji SEKIYA, Yasushi WAKAHARA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) In the recent network society, there have been many security problems. The attackers often spoof their addresses because they do not want to be traced back. So some approaches are proposed to detect IP spoofed packets. In this paper, some of them are introduced, Ingress filtering, RPF and NSD. Each method holds different information which is applied to detect IP spoofed packets and different principles to collect such information. This paper introduces these methods briefly and points out their problem. And we propose a more effective method, FSN. The method collects information, called NLT, from topology information earned by routing protocol. The simulation results show that FSN can detect IP spoofed packets more accurately.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) security / IP Spoofing / DDoS attacks / filtering / topology information
Paper # IN2006-30
Date of Issue

Conference Information
Committee IN
Conference Date 2006/6/15(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Networks (IN)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Efficient detection of IP spoofed packets by making use of network topology information
Sub Title (in English)
Keyword(1) security
Keyword(2) IP Spoofing
Keyword(3) DDoS attacks
Keyword(4) filtering
Keyword(5) topology information
1st Author's Name Toshinori OTSUKA
1st Author's Affiliation Graduate School of Frontier Sciences, The University of Tokyo()
2nd Author's Name Fumitaka NAKAMURA
2nd Author's Affiliation Graduate School of Frontier Sciences, The University of Tokyo:Information Technology Center, The University of Tokyo
3rd Author's Name Yuji SEKIYA
3rd Author's Affiliation Graduate School of Frontier Sciences, The University of Tokyo:Information Technology Center, The University of Tokyo
4th Author's Name Yasushi WAKAHARA
4th Author's Affiliation Graduate School of Frontier Sciences, The University of Tokyo:Information Technology Center, The University of Tokyo
Date 2006-06-23
Paper # IN2006-30
Volume (vol) vol.106
Number (no) 118
Page pp.pp.-
#Pages 6
Date of Issue