skip to main content
10.5555/1045502.1045544guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Tracing Anonymous Packets to Their Approximate Source

Published: 08 December 2000 Publication History

Abstract

Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program running on an unknown host, and carried by packets that bear no clues that could be used to determine their originating host. Identifying the source of such an attack requires tracing the packets back to the source hop by hop. Current approaches for tracing these attacks require the tedious continued attention and cooperation of each intermediate Internet Service Provider (ISP). This is not always easy given the world-wide scope of the Internet.We outline a technique for tracing spoofed packets back to their actual source host without relying on the cooperation of intervening ISPs. First, we map the paths from the victim to all possible networks. Next, we locate sources of network load, usually hosts or networks offering the UDP chargen service [5]. Finally, we work back through the tree, loading lines or router, observing changes in the rate of invading packets. These observations often allow us to eliminate all but a handful of networks that could be the source of the attacking packet stream. Our technique assumes that routes are largely symmetric, can be discovered, are fairly consistent, and the attacking packet stream arrives from a single source network.We have run some simple and single-blind tests on Lucent's intranet, where our technique usually works, with better chances during busier network time periods; in several tests, we were able to determine the specific network containing the attacker.An attacker who is aware of our technique can easily thwart it, either by covering his traces on the attacking host, initiating a "whack-a-mole" attack from several sources, or using many sources.

References

[1]
Cheswick, B., Burch, H., and Branigan, S., "Mapping and Visualizing the Internet", to appear in Proceedings of USENIX Annual Technical Conference 2000.]]
[2]
Postel, J., "RFC 791: Internet Protocol," The Internet Society, Sept 1981.]]
[3]
Postel, J., "RFC 768: User Datagram Protocol," The Internet Society, Aug 1980.]]
[4]
Postel, J., "RFC 792: Internet Control Message Protocol," The Internet Society, Sept 1981.]]
[5]
Postel, J., "RFC 864: Character Generator Protocol," The Internet Society, May 1983.]]
[6]
Govindan, R. and Tangmunarunkit, H., "Heuristics for Internet Map Discovery," Technical Report 99-717, Computer Science Department, University of Southern California.]]
[7]
Claffy, K. "Internet measurement and data analysis: topology, workload, performance and routing statistics," NAE '99 workshop]]
[8]
CERT, "smurf IP Denial-of-Service Attacks," CERT advisory CA-98.01, Jan, 1998.]]
[9]
CERT, "Results of the Distributed-Systems Intruder Tools Workshop", The CERT Coordination Center, Dec, 1999.]]
[10]
Ferguson, P. and Senie, D. "RFC 2267: Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing," The Internet Society, Jan, 1998.]]
[11]
CERT, "TCP SYN Flooding and IP Spoofing Attacks," CERT Advisory CA-96.21, Sept, 1996.]]
[12]
CERT, "IP Spoofing Attacks and Hijacked Terminal Connections," CERT Advisory CA-95.01, Jan, 1995.]]

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
LISA '00: Proceedings of the 14th USENIX conference on System administration
December 2000
379 pages

Publisher

USENIX Association

United States

Publication History

Published: 08 December 2000

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media