Robust IP Spoof Control Mechanism Through Packet Filters
Robust IP Spoof Control Mechanism Through Packet Filters
Robust IP Spoof Control Mechanism Through Packet Filters
M.Tech (CSE), Dept. of Computer Science & Engineering, Chaitanya Engineering College Visakhapatnam, A.P., India.
Assoc.Professor, Dept. of Computer Science & Engineering, Chaitanya Engineering College Visakhapatnam, A.P., India.
Abstract - A new approach for detecting spoofed IP level, called IP Spoofing Detection Approach (ISDA), is proposed. The purpose of this approach is maximally to keep effective parts and remove forged parts of Source IP addresses under flooding attacks and dynamically configure flow aggregation scheme for flow-based network Intrusion detection to build the most effective intrusion detection approach. With the wide usage of internet in many fields, networks are being exposed to many security threats, such as distributed denial of service (DDoS) attack, worm/virus, and so on. So prevention failure of network security leads to the revealing of information or interruption of network services, thereby results in the enormous economic loss. In this paper, we propose an effective method for defense against IP spoofing attack, which is based on trace route and the cooperation with trusted adjacent nodes. IP Spoofing is a problem without an easy solution, since its inherent to the design of the TCP/IP suite. Understanding how and why spoofing attacks are used, combined with a few simple prevention methods, can help protect your network from these malicious cloaking and cracking techniques.. Intrusion Detection System (IDS) has been used to secure these environments for sharing their data over network and host based IDS approaches. The rapid improvements of intrusions in internet and other networks are the main factors responsible for the propagation of different threats and vulnerabilities in the computing environment. Now a days the Ids makes use of the signature based detection approach which detects the actions based on analyzing the patterns such as text, password, time etc. We present the results of the experiment, compare the method with others. The result demonstrates that the method can effectively and steadily detect the IP spoofing attack, thereby blocks it. Keywords ISDA, DDoS, IP Spoofing, TCP/IP, IDS.
I. INTRODUCTION The rapid improvements in the intrusion events for LAN as well as for the internet have compelled many organizations to implement security techniques against these threats. The Internet Protocol is actually responsible
for providing stable services for the delivery of information across the internet. The informations presented by these IP packets will be based on the TCP/IP layers. The IP datagram will have a header which will have the source details for the network that is to be forwarded to the IP datagram destination. The details that are carried by IP header are time to live, source and destination addresses, types of service and others relevant information. The attackers usually make use of the information in the header to send and receive the information over the network. Intrusion Detection Systems can be considered as tools for managing the vulnerabilities and threats in the ever changing network environment. Here by the word threats we mean people or groups who have the potential capabilities so as to compromise some other computer systems [4]. These may be a discontented employee, an inquisitive teenager, or spy or hacker from an opponent company or any foreign government. Attacks on network computer system could be devastating, affect networks, and corporate establishments. It's requiring to provide and curb these attacks and Intrusion Detection System helps to identify the intrusions. By not using NIDS, to monitor any network activity will result in an irreparable damage to an organization's network. As we know intrusion attacks are said to as "those attacks in which an attacker enters your network to read, damage, and/or steal your data" [1]. These attacks can be sub divided into two categories: pre intrusion activities and the actual intrusions. In this paper, we propose an effective method for preventing IP spoofing attacks based on trusted network. By the mutual cooperation among trusted adjacent nodes and trace route, our proposed method can detect and block the intruder from external network, which intrudes trusted network by IP spoofing attack. Additionally, for the case that only the local security system is run, because the trusted adjacent node monitors cooperatively the generating external attacks in the local node, the method can effectively reply IP spoofing attack. Currently the IDS make use of two basic intrusion detection approaches. The first one is an Page 1
These environments need to have secure systems to detect and eliminate the external and internal attacks from other attackers over LAN and Host based IDS. As we know that the environments are constantly changing introduces some new threats and unknown attacks so the intrusion detection system has been made use of to secure and support these environments for sharing their data over networks. Together with that the IP spoofing over online environments presents different patterns and follows the exceptional behaviors based on attacker's techniques which are a major concern with the deployment of new technique for detecting and eliminating the unknown threats attacks during the time of data sharing. The major disadvantages that have been detected in using the commonly used the signature based detection approach are the basic difficulties in updating in formations needed, the second one is with the maintenance of the IDS that is
B. The process of IP spoofing attack For explaining the proposed defense method well, we first introduce the process of IP spoofing attack. In Fig. 2, node A and node B are considered as trusted nodes. According to three-way- hand shakes [9], if a hacker intrudes trusted node B by disguising IP address of another node A, it must firstly attack and control the node A, then blocks it from connecting with internet. Next, it sends a TCP SYN connection request to node B by disguising IP address of node A, after node B receives the request, node B sends a SYN-ACK to node A, but node A can not receive the message actually. Once the hacker gets the SeqNo (sequence number), it can send ACK to B again, the connection is established between the hacker and node B, IP spoofing attack comes true. C. The Model of Traceroute According to the process of IP spoofing attack, we proposed the model of traceroute. As shown in Fig. 2, we suppose that node H is attacker, node A is source node and node B is victim/target node. When attacker H attacks node B by disguising the IP address of node A, on the third step of three-way handshake, attacker H will intercept the acknowledgement from victim node B to node A. So we can not detect IP spoofing attack by traceroute from victim node B to source node A directly. But in the network, these nodes can cooperate with each other. So the victim node gets help from other trusted nodes, IP spoofing detection can be implemented. Fig. 3 shows the model of traceroute model. Here, node C is a trusted adjacent node of node B, and we call node C as detection node. When source node A sends access request to target node B, we trace the route to node A with the help of detection node C. If the attacker H has controlled the node A, when we trace the route in hop-by-hop from IP address of node C to IP address of node A, the traceroute result is "host unreachable", otherwise, in normal access status, source node is reachable. We describe the process of traceroute as Fig. 4.
III. PROPOSED METHOD FOR DEFENSE AGAINST IP SPOOFING ATTACK In this section, we propose an effective method for defense against IP spoofing attack based on traceroute and the cooperation with trusted adjacent nodes. By this method, we can effectively detect and prevent IP spoofing attack. A. Network Architecture with Trusted Nodes We first propose the network architecture based on trusted adjacent nodes, which is shown as Fig. 1. In this network, each trusted node has access authority of others. Only these nodes can access each other, namely they are restricted access authority. We call these nodes as trusted nodes, where each trusted node has access information of the other trusted nodes, such as node name and IP address, hop count and trace route from itself to the other trusted nodes. In figure (1), six trusted nodes include node A, B, C, D, E and F. The network can is used for campus network or enterprise network and these nodes can be scattered in different geographical location. After the trusted node passes IP authentication, the node can access each other, which is denoted as: A={B, C, D, E, F}, B={A, C, D, E, F}, and so on. Figure (2) shows the detailed network structure with routers, Nodes of R1-R9 are the routers which connect with the trusted nodes.
D. Proposed System Model Based on the network architecture with trusted adjacent nodes information and the model of traceroute, we propose the system model. Fig. 5 shows its architecture and we describe the model as follows in detail. Page 3
1.
2. 3. Spoof detection is the main algorithm. In lines 2-5, the function variables are initialized with the set of routers that are currently connected to the judge router, the set of IP addresses assigned to each of the access routers and the set of probes that JR sent in previous monitoring times. In lines 6 - 9, JR receives packets for the monitoring period x and the algorithm analyze packets is called to detect attacks related to scenario 2. The trust values for the access routers are calculated in lines 11 - 14. Lines 15 - 17 call the algorithm that performs detection and trust assessment related to the attacks in scenario 3. Finally, lines 18 - 20 detect and calculate trust for scenario. IRX:=the set of the IP addresses assigned to access router x PR:=the set of all the active probes Ari is the ith element in AR While(Tx>0) For each received packet p Analyze_packets(p,p_Interface); End for End while For each element Ari in AR If(Ari. Packets>0) Calculate_trust(Ari, Ari. Packets, Ari. Valid); 4. 5. 6. 7.
Source node A sends normal access request to target node B, or attacker H sends request to victim node B by disguising IP address of A; After node B receives the request, node B sends traceroute request to detection node C; Node C traces the route information from node C to node A; Node C gets traceroute result (reachable or unreachable); Node C informs the traceroute result to node B; If (host reachable) node B accepts the access of node A, else node B blocks the attacker; If (IP spoofing ) node B sends alarm information.
Page 4
2) Trace route Module In this module, we implement the trace route from detection node to source node. If source host is trusted node, the result information of trace route is "host reachable", otherwise, when IP spoofing attack occurs, the result information is "host unreachable". At the same time, the rule base and log base will be updated dynamically. The result of trace route is sent to the implementation module.
3) Implementation Module Implementation module receives the result from the above two modules, and implement it. If IP authentication is illegal or IP spoofing attack occurs, the node is blocked. Otherwise, source node is permitted to access destination node. In order to further describe the method, the system flow chart of IP spoofing prevention method is shown as Fig. 6.
IV. SIMULATION AND RESULT ANALYSIS We simulate the experiment by using winsock programming. We implement the detection of IP spoofing attack by mutual cooperation with trusted computers. The database used in this experiment includes two data tables (Access Rule Base), which are shown as the follow: Node Information Table (node name, node IP, hop count), which is used for storing the information of trusted nodes. Route Information Table (node IP, SeqNo, HopIP), which is used for storing the trace-route information hop-by-hop from detection host to source host.
We first implement the testing in external network, which includes the status of normal access and IP spoofing attack. According to the model of traceroute, we trace the route information in hop-by-hop from detection node to source node or controlled node. Fig. 7 and Fig. 8 show the traceroute information in the status of normal access and abnormal access respectively. Here, IP address of detection node is 211.35.79.254 and that of source node is 210.125.186.29. The geographical positions of detection node and source host are in Seoul, and Jinju, Korea respectively. From Fig. 8, we find that hop count of traceroute is 14, the result of detection is unreachable when IP spoofing attack occurs. Moreover, we compare our proposed method with the method of TNA, which is shown as table 1. From this table, the trace time of our
Page 5
V. CONCLUSION AND FUTURE WORK In this thesis, we propose an effective method for defense against IP spoofing attack in the network structure with trusted nodes. By trace route and the cooperation with the trusted nodes, we implement the detection and prevention of IP spoofing attacks. The experiment result demonstrates that the method can effectively and steadily detect the IP spoofing attack, thereby block it. Above all, the scheme is only implemented by software method, does not depend on some additional hardware. Secondly, we propose a cooperation model of trace route with the help of trusted adjacent node. Thirdly, rule base can be updated dynamically. In the future work, we consider how to further analyze the method of trace route and how to analyze packet information better.
REFERENCES [1] K. Xu, Z. Zhang, and S. Bhattacharya. "Profiling Internet Backbone Traffic: Behavior Models and Applications," Proc. of ACM SIGCOMM, Philadelphia, PA, USA, pp. 169180, August 2005. [2] S. H. Lee, H. J. Kim, J. C. Na, and J. S. Jang, "Abnormal traffic detection and its implementation," The 7th International Conference on Advanced Communication Technology, vol. 1, pp. 246250, 2005. [3] A. Soule, K. Salamatian, and N. Taft, "Combining Filtering and Statistical Methods for Anomaly Detection," Internet Measurement Conference 2005, Research, pp. 331344, 2005. [4] A. Bremler-Barr and H. Levy, "Spoofing prevention method," 24 th Annual Jiont Conference of the IEEE Computer and Communications Societies, vol. 1, pp. 536547, March 2005. [5] S. J. Templeton and K. E. Levitt, "Detecting spoofed packets," DARPA Information Survivability Conference and Exposition, vol. 1, pp. 164175, April 2003. [6] Y. Xiang and W. L. Zhou, "Trace IP packets by flexible deterministic packet marking (FDPM)," Proceedings IEEE Workshop on IP Operations and Management, pp. 246252, 2004. [7] T. Baba and S. Matsuda, "Tracing network attacks to their sources," IEEE Internet Computing, vol. 6, pp. 2026, 2002. [8] I. B. Mopari, S. G. Pukale and M. L. Dhore, "Detection and defense against DDoS attack with IP spoofing," International Conference on Computing, Communication and Networking, 2008, pp. 1-5, Dec. 2008. [9] L. Garber, "Denial-of-service attacks rip the Internet," IEEE Computer, vol. 33, pp. 1217, April 2000.
Page 6