By Topic

Towards Spoofing Prevention Based on Hierarchical Coordination Model

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Gao-feng Lv ; School of Computer, National University of Defense Technology, Changsha, Hunan, 410073, P.R.China. e-mail: ; Zhi-gang Sun

A novel approach for filtering spoofed IP packets, called spoofing prevention based on hierarchical coordination model, is proposed. In the approach a unique temporal signature is associated with each ordered pair of source destination networks. Each packet leaving a source network S is marked with the signature Sig(S,D) , associated with (S,D) , where D is the destination network. Upon arrival at the destination network the signature is verified and removed. The method verifies the authenticity of packets carrying the address s which belongs to the source address space of network S indexed by the signature. While the information about source address spaces of network is transmitted by hierarchical coordination model, in which by the same method the information is propagated and processed for routers residing in the same hierarchical, furthermore using dynamic bloom filter the information is fused to be delivered over hierarchies, thus the implementation is efficient The major benefits of SP-HCM are the strong incentive it provides to network operators to implement it, and the fact that the approach lends itself to stepwise deployment, since it benefits networks deploying the approach even if it is implemented only on parts of the Internet.

Published in:

2007 Workshop on High Performance Switching and Routing

Date of Conference:

May 30 2007-June 1 2007