2009
DOI: 10.1145/1516539.1516541
|View full text |Cite
|
Sign up to set email alerts
|

On the state of IP spoofing defense

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0
2

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 76 publications
(45 citation statements)
references
References 30 publications
0
42
0
2
Order By: Relevance
“…Otherwise, the investigation shall have to investigate all IP addresses and request logs from all servers. It may be very difficult to track a sender from the IP address if the sender has tampered IP address at packet level (Ehrenkranz et al 2009). Once the source of the e-mail message under investigation has been determined or some one is strongly suspected for being the source, his or her computer, e-mail client software, web browser, etc.…”
Section: Discussionmentioning
confidence: 99%
“…Otherwise, the investigation shall have to investigate all IP addresses and request logs from all servers. It may be very difficult to track a sender from the IP address if the sender has tampered IP address at packet level (Ehrenkranz et al 2009). Once the source of the e-mail message under investigation has been determined or some one is strongly suspected for being the source, his or her computer, e-mail client software, web browser, etc.…”
Section: Discussionmentioning
confidence: 99%
“…However, the drawback is that it needs both the communication parties's support and the overhead caused by IPSec is also a noticeable issue. It is ineffective at mitigating a bandwidth-based DoS attack, which may in fact exacerbate the problem, since initializing a connection may require more resource when using IPSec than not [16].…”
Section: Related Workmentioning
confidence: 99%
“…The attackers can send spoofed packets, i.e., packets with fake (spoofed) sender IP address. Due to ingress filtering [4,14,21] and other anti-spoofing measures, IP spoofing is less commonly available than before, but still feasible, see [2,11]. Apparently, there is still a significant number of ISPs that do not perform ingress filtering for their clients (especially to multihomed customers).…”
Section: Modelmentioning
confidence: 99%