File(s) stored somewhere else
Please note: Linked content is NOT stored on La Trobe and we can't guarantee its availability, quality, security or accept any liability.
NAT++: an efficient micro-nat architecture for solving ip-spoofing attacks in a corporate network
journal contributionposted on 15.11.2020, 23:00 by Prakash VeeraraghavanPrakash Veeraraghavan, Dalal HannaDalal Hanna, Eric PardedeEric Pardede
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. The Internet Protocol (IP) version 4 (IPv4) has several known vulnerabilities. One of the important vulnerabilities is that the protocol does not validate the correctness of the source address carried in an IP packet. Users with malicious intentions may take advantage of this vulnerability and launch various attacks against a target host or a network. These attacks are popularly known as IP Address Spoofing attacks. One of the classical IP-spoofing attacks that cost several million dollars worldwide is the DNS-amplification attack. Currently, the availability of solutions is limited, proprietary, expensive, and requires expertise. The Internet is subjected to several other forms of amplification attacks happening every day. Even though IP-Spoofing is one of the well-researched areas since 2005, there is no holistic solution available to solve this problem from the gross-root. Also, every solution assumes that the attackers are always from outside networks. In this paper, we provide an efficient and scalable solution to solve the IP-Spoofing problem that arises from malicious or compromised inside hosts. We use a modified form of Network Address Translation (NAT) to build our solution framework. We call our framework as NAT++. The proposed infrastructure is robust, crypto-free, and easy to implement. Our simulation results have shown that the proposed NAT++ infrastructure does not consume more than the resources required by a simple NAT.