Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention
Abstract: In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets
with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another
computing system. On January 22, 1995, in an article entitled, ―New form of attack on computers linked to Internet is uncovered, John
Markoff of the New York Times reported on the TCP/IP protocol suite's security weakness known as IP spoofing. The IP spoofing
security weakness was published by S. M. Bellovin (1989). However, not much attention has been paid to the security weaknesses of the
TCP/IP protocol by the general public. This is changing as more people and companies are connecting to the Internet to conduct
business. This paper is on ― “Proposed methods of IP Spoofing Detection & Prevention”. This paper contains an overview of IP
address and IP Spoofing and its background. It also shortly discusses various types of IP Spoofing, how they attack on communication
system. This paper also describes some methods to detection and prevention methods of IP spoofing and also describes impacts on
communication system by IP Spoofing. We think that our proposed methods will be very helpful to detect and stop IP spoofing and give
a secured communication system.
This attack may take place from outside where sequence and
acknowledgement numbers are unreachable. Attackers
usually send several packets to the target machine in order to
sample sequence numbers, which is doable in older days.
Figure 2: Spoofed source IP address
Usually the attacker does not have access to the reply, abuse
Figure 2: Spoofed source IP address, illustrates the trust relationship between hosts. For example: Host C sends
interaction between a workstation requesting web pages an IP datagram with the address of some other host (Host A)
using a spoofed source IP address and the web server as the source address to Host B. Attacked host (B) replies to
executing the requests. If a spoofed source IP address (i.e. the legitimate host (A) shows in Figure 4.
172.16.0.6) is used by the workstation, the web server
executing the web page request will attempt to execute the
request by sending information to the IP address of what it
believes to be the originating system (i.e. the workstation at
172.16.0.6). The system at the spoofed IP address will
receive unsolicited connection attempts from the web server
that it will simply discard.
Figure 4: Blind Spoofing
3. Why IP Spoofing is Easy
4.3 Hijacking an Authorized Session
Problem with the Routers. IP routing is hop by hop. Every
IP packet is routed separately. The route of an IP packet is An attacker who can generate correct sequence numbers can
decided by all the routers the packet goes through. send a reset message to one party in a session informing that
Routers look at Destination addresses only. party that the session has ended. After taking one of the
Authentication based on Source addresses only. parties’ offline, the attacker can use the IP address of that
To change source address field in IP header field is easy party to connect to the party still online and perform a
[1] malicious act on it. The attacker can thus use a trusted
communication link to exploit any system vulnerability.
Keep in mind that the party that is still online will send the
replies back to the legitimate host, which can send a reset to
it indicating the invalid session, but by that time the attacker
might have already performed the intended actions. Such
actions can range from sniffing a packet to presenting a shell
from the online host to the attacker's machine.
handshake. Then hosts A and B can communicate with each Attacker sends a forged RIP packet router 2 (Figure 7) and
other, as shown in Figure 5. says it has the shortest path to the network that router1
connects. Then all the packets to that network will be routed
to attacker (Figure 8). The attacker can sniff the traffic.
distinction unclear. In these cases, host based methods can be machine, there will be no corresponding entry for
used at the router. A number of IP addresses are reserved by initiating that remote access.
the IANA for special purposes. These are listed in table 1.
The addresses in the first group are private addresses and There are some configuration and services that are vulnerable
should not be routed beyond a local network. Seeing these on to IP spoofing:
an outside interface may indicate spoofed packets.
Depending on the particular site, seeing these on an internal RPC (Remote Procedure Call services)
address would also be suspicious. The other addresses in Any service that uses IP address authentication
table 1 are special purpose, local only addresses and should The X Window System
never be seen on an outer interface. The R services suite (rlogin, rsh, etc.)
Mac Spoofing
Macaroni Screen Saver Bundle
SpoofMAC
sTerm
MAC Change
Bayesian estimation and decision theory in order to model In this chapter, cryptography uses to enhance the security in
perceptual distortion and even aesthetic judgment. IP compression technique.
Cryptography has some major issues: Split the packet header with data
Applied the GRS compression algorithm
Key length: The combination of the algorithm and the key Apply the cryptography technique
length are factors of cryptographic strength. The Transmit the data
algorithm is usually well known. The longer key is the Decryption
stronger the cryptographic strength of a given algorithm. Decompression
Some countries have export laws that limit the key length Original information.
of a given cryptographic algorithm.
Key recovery: In recent years, export laws have been First take the original packet then split the packet header with
modified if the cryptographic algorithm includes the the data. Whenever the data transmission happen that time
capability of incorporating key recovery methods. These 4tuple information are common for through out the data
modified laws enable governments to wire-tap for transfer. If we compress these things we can minimize the
encrypted electronic data if they deem it necessary to do many space due to that we can utilize bandwidth in optimized
so. manner.
Cryptography use: A distinction is sometimes made about
whether cryptography is used for authentication and The next step is applying the GRS algorithm which is the
integrity purposes or for confidentiality purposes. When novel algorithm what we designed for our implementation.
used for confidentiality, the export laws are typically The concept behind in this is group of IP address considered
much more stringent. as a single no which is taken as host identification no
likewise we have to interchange into 4tuple’s. For example
192.168.30.2 this is a one host IP address. This will
Volume 2 Issue 8, August 2013
442
www.ijsr.net
International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064
converted into like this. 2. We have to remember one thing network can use this key to access information. Without
after establishing the connection only the stream of packet this, access is denied.
will change into like this.
6.4 Software to Stop IP Spoofing
The next step is applying the cryptography technique. There
are variety of techniques and complex methods available but We can use some software’s to stop IP Spoofing:
in this scenario we couldn’t use the complex technique
because we going to apply in packet header. If we use StopCut
complex technique, for encryption and decryption will take Find Mac Address pro
too much time. We have to use simple functions; in our SecurityGateway for Exchange / SMTP
implementation we used transformation function as method. PacketCreator
It just modify the one value into another form using add or Responder Pro
multiply that value into original no. for example the previous
2 will converted onto 6 adding 4 with 2 . The final thing is
we have to send the key value for decryption. Key value will
7. Conclusion
add into encrypted value for easy identification similar to the
This paper describes the use of IP spoofing as a method of
format of IP address 6.4 is the final value that will send to the
attacking a network in order to gain unauthorized access and
destination machine likewise all 4tuple’s. Again the
some detection and prevention methods of IP spoofing. The
decryption will happen in reverse manner.
goal of the attack is to establish a connection that will allow
the attacker to gain root access to the host, allowing the
We have also proposed some prevention methods to stop IP
creation of a backdoor entry path into the target system. We
spoofing. They are:
think that our proposed methods will be very helpful to detect
and stop IP spoofing and give a secured communication
1. The best method of preventing the IP spoofing problem is
system.
to install a filtering router (Figure 9) that restricts the
input to our external interface (known as an input filter)
by not allowing a packet through if it has a source address 8. Acknowledgement
from our internal network. In addition, we should filter
outgoing packets that have a source address different Special thanks to Md. Samsuzzaman, Assistant Professor,
from our internal network in order to prevent a source IP Department of Computer & Communication Engineering,
spoofing attack originating from our site. Faculty of Computer science & Engineering, Patuakhali
Science & Engineering for his helpful comments on IP
Spoofing We also thank the anonymous reviewers for their
helpful and constructive comments.
References