Anti-Spoofing

Anti-SpoofingHow do we help prevent the massive Distributed Denial-of-Service (DDoS) attacks we continue to see on the Internet?  What can be done by network operators, enterprises and others to help reduce DDoS attacks and other similar threats?

There are unfortunately no magic “silver bullets”, but one mechanism that can be implemented by network operators is the prevention of “spoofing” of IP addresses, what we call “anti-spoofing technologies”.

To execute a DDoS attack, what commonly happens is that attackers use malware and “bots” running on unsuspecting computers to send large quantities of requests at a target server.  All of the requests typically have bogus, “spoofed” source IP addresses and so when the server attempts to answer these requests it gets stalled waiting to open connections to the non-existent requesting servers.  The spoofed source IP addresses (either IPv4 or IPv6) also make it extremely hard to track down where the sources of the attacks are coming from.

What seems to be an easy solution is to simply not allow packets to leave your network to go to the rest of the Internet with a spoofed IP source address.  Particularly at the very edge of the Internet, an enterprise or home network, for instance, can know precisely what range of IP addresses are on its network and only allow those addresses as source addresses for outgoing packets.  It gets a bit more challenging and complicated in larger networks, but this approach in general is often called “BCP 38” after the IETF Best Current Practice (BCP) of that name. Some people also call this “network ingress filtering” or “source address validation“.

Why, then, have we as an Internet community not widely implemented BCP 38 and its companion BCP 84?

That is what this “Anti-Spoofing” section of Deploy360 is all about.  We cover here some of the technologies, the tools and the reasons for implementing anti-spoofing.  Our goal is to make the Internet safer, faster and more secure – and help do as much as possible to prevent DDoS attacks.

To get started, we encourage you to visit these resources below on our site:

We also encourage you to read about the Mutually Assured Norms for Routing Security (MANRS) initiative where committing to deploy anti-spoofing technologies is one of the criteria for participating.

Please do watch our Deploy360 blog for more stories around anti-spoofing technologies.  And please let us know:

  • Have you already implemented these type of anti-spoofing measures?
  • If so, would you be interested in providing a case study of what you had to do?
  • If not, what has prevented you from doing so?  How can we help you overcome any issues?

We would like to hear from you – you can leave a comment to this page or contact us via email or social networks.  How can we help you prevent spoofed IP addresses and make the Internet more secure?

July 18th, 2014 by | Posted in | 1 Comment

One Response to Anti-Spoofing

Leave a Reply

Your email address will not be published. Required fields are marked *