Abstract Proceedings of ICIRESM – 2020
Full conference PDF is available to the subscribed user. Use your subscription login to access,
EVASIVE INTERNET: REDUCING INTERNET VULNERABILITY THROUGH TRANSIENT DESTINATION CONTROLLED ADDRESSING
The current Internet architecture allows hosts to send arbitrary IP packets across a network, which may not reflect valid source address information. IP spoofing and denial-of-service attacks are widespread. Filtering techniques are not sufficient to defend against these attacks. The current Internet design calls for in-network certification of addresses and provenance of traffic they generate. This paper proposes a capability-based architecture, coined as Evasive Internet Protocol (EIP), to overcome these issues by introducing transient addresses as an alternative to IP addresses to reach a particular destination. In this architecture, the destination can only be reached through a valid capability. The aim of this paper is to implement EIP for end hosts and measure its performance compared to existing Internet protocols. The paper presents the design of EIP, including the transient address format, the capability management protocol, and the in-network enforcement mechanism. The paper also presents the implementation of EIP for end hosts and the performance evaluation results. The experimental results show that EIP can effectively defend against IP spoofing and denial-of-service attacks. EIP also has good performance, with low overhead and high throughput.
Evasive Internet Protocol, transient addresses, capability management protocol, in-network enforcement, IP spoofing, denial-of-service attacks
13/11/2020
187
20187
IMPORTANT DAYS
Paper Submission Last Date
October 20th, 2024
Notification of Acceptance
November 7th, 2024
Camera Ready Paper Submission & Author's Registration
November 1st, 2024
Date of Conference
November 15th, 2024
Publication
January 30th, 2025