COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Systems Research Group Seminar > Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet
Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the InternetAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Marco Caballero. Abstract: The Spoofer project (https://spoofer.caida.org/) has collected data on the deployment and characteristics of IP source address validation on the Internet since 2005. Data from the project comes from participants who install an active probing client that runs in the background. The client automatically runs tests both periodically and when it detects a new network attachment point. We analyze the rich dataset of Spoofer tests in multiple dimensions: across time, networks, autonomous systems, countries, and by Internet protocol version. In our data for the year ending August 2019, at least a quarter of tested autonomous systems did not filter packets with spoofed source addresses leaving their networks. We show that routers performing Network Address Translation do not always filter spoofed packets, as 6.4% of IPv4/24 tested in the year ending August 2019 did not filter. Worse, at least two thirds of tested ASes did not filter packets entering their networks with source addresses claiming to be from within their network that arrived from outside their network. We explore several approaches to encouraging remediation and the challenges of evaluating their impact. While we have been able to remediate 352 IPv4/24, we have found an order of magnitude more IPv4/24 that remains unremediated, despite myriad remediation strategies, with 21% unremediated for more than six months. Our analysis provides the most complete and confident picture of the Internet’s susceptibility to date of this long-standing vulnerability. Although there is no simple solution to address the remaining long-tail of unremediated networks, we conclude with a discussion of possible non-technical interventions, and demonstrate how the platform can support evaluation of the impact of such interventions over time. Bio: Matthew Luckie is a Senior Lecturer at the University of Waikato in New Zealand, whose research interests are in measurement and analysis of the Internet at scale. His focus is mostly in Internet routing and topology, but he has some interest in Internet security. His work has received best paper awards at ACM SIGCOMM (2018), ACM IMC (2015), and ACM CoNEXT (2015). His homepage is at https://www.caida.org/~mjl/ This talk is part of the Computer Laboratory Systems Research Group Seminar series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsType the title of a new list here The Welding & Joining SocietyOther talksAn Older Special Function meets a (Slightly) Newer One Prevention of mental illness in the adolescent years Co-factors pose stoichiometric questions for Dicer complex assembly and precursor miRNA processing Art speak Competing instabilities of three-dimensional boundary layer flow over spinning bodies |