problem solution text(Tewodros Geberehana)

advertisement
Problem- Solution Text (Tewodros Geberehana)
IP spoofing attacks and the recommended solutions
Ip (Internet Protocol) spoofing attacks are one of the types of attacks being done on computer systems.
IP is the rule that governs how communication is done for systems to communicate with each other
thereby using similar types of communications methodology .IP is the basic protocol that is used for
communication between computers that are connected either locally or globally [1][2]. IP address
spoofing or IP spoofing refers to creation of IP packet with fake source IP addresses, for the purpose of
hiding one’s identity or Malicious purpose [1].IP packets consists of headers that describes the different
sections like the sender IP address, the receivers’ address , the data to be sent and so on. Therefore, an
IP address spoofing is done with the manipulation of the headers in the IP packet [2].
Figure1.The IP Header source [3]
As can be seen in the figure the IP header contains around 14 fields in which source and destination
addresses are part of the header. The source IP address is used so as to identify the sender of the IP
packet and the destination address to identify the one the message is intended for. Since IP protocol do
not has a way to verify that the source address is generated by the sender an attacker will use this
weakness of the protocol to modify the source IP address of the packet that is being intercepted [3].
IP spoofing is usually done for the purpose of denial of service attacks [1].denial of service attack which
is also termed as distributed denial of service, is a type of attack with the intent of making a computer
resource unresponsive or unavailable from intended users by attacking the system [1] .In Dos attack the
system will be overwhelmed with unexpected amount of IP traffic, with Spoofed IP packets, so as to
degrade the performance of the system and making it finally unresponsive. To overwhelm a system an
attacker can randomly choose source Ip address and flood the destination with traffic. IP spoofing can
also be used to gain unauthorized access , one example for this is on systems that has trust among each
other in corporate level and use IP address as an authentication(verification of intended users)
methods[1][2].
IP Packet Filtering is one of the ways to protect the Ip spoofing in a network [1].there are two
types of packet filtering mechanism called ingress and Egress filtering that can be done at the gate
of the network .Ingress filtering is a type of filtering that will prohibit any type of outside packets that
will try to come in to the network using its source address as one of the inside systems. Egress
filtering will prohibit any type of packet that will try to leave the network using the source address
that does not belong to the inside system .Therefore, by implementing the egress and ingress
filtering on to a firewall (a guard against intruders for network) it might be possible to protect the
network against spoofed IP packets. Though it is possible to do a great contribution using ingress
and egress against IP spoofing ,an attacker might be going to use some external address that can
bypass the ingress filtering, since source address is not as the inside systems. As a result it is better
to protect the IP packet using high level protection mechanism called secure shell (SSH) and secure
socket layer (SSL).both SSH and SSL can protect the IP packet that is transmitting from being
intercepted by outsiders/intruders.
IP spoofing is one the attack that is being done in a network of systems and has been a threat for some
time. The attack usually has a malicious purpose and could be done through hiding identity by faking
source IP address. Sometimes spoofed packets are more difficult to filter since each spoofed packet
appears to come from a different address[2] .As mentioned above it is better to do protection on higher
level using SSH and SSL so as to protect the IP packet from being modified by Intruders.
References,
[1]. Name Wikipedia Title IP addresses Spoofing
Address => http://en.wikipedia.org/wiki/IP_address_spoofing
Date accessed 15 February 2011
[2].Name Topbits.com
Title IP addresses Spoofing
Address => http://www.tech-faq.com/ip-address-spoofing.html
[3]. Name Cisco Title IP spoofing
Address => http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_10-4/104_ipspoofing.html
Download