Article thumbnail

Reviewing Technological Solutions of Source Address Validation

By Jongbok Byun, Christopher P Paolini and Bongsik Shin

Abstract

It is essential to know the source IP address of a packet to prevent the IP spoofing attack which masquerades the sender\u27s true identity. If there is a way to trace back the origin of the massive DDoS attacks, we could find the responsible parties of the incidents and prevent future attacks by blocking them. Unfortunately, the original TCP/IP stacks don\u27t require the real source IP address to forward the packets to the destination. Malicious attackers can modify the source IP address to hide its true identity and able to send the fraudulent packets to the victim. One of the critical features of the next generation Internet is having a secure Internet which provides trust between participants and protects the privacy of the individuals. In this paper, we review the various approach to provide the source address validation (SAV) schemes. There are many new methods have been proposed, no single way is providing the comprehensive solution to this issue. Privacy is a critical issue to consider when the true identity is available on the network as well

Topics: Source Address Validation, Source Address Validation Architecture, SAVA, Authenticated Source IP Address, Software Defined Networking, SDN, Internet Protocol, IPv6, Spoofing, SAVI, Management Information Systems
Publisher: AIS Electronic Library (AISeL)
Year: 2018
OAI identifier: oai:aisel.aisnet.org:wisp2018-1024
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • https://aisel.aisnet.org/wisp2... (external link)
  • https://aisel.aisnet.org/cgi/v... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.