Spoofer project update

Robert Beverly rbeverly at rbeverly.net
Tue Mar 31 10:36:18 CDT 2009


Hi, as many of you are acutely aware, IP source spoofing is still a
common attack vector.  The ANA spoofer project:
  http://spoofer.csail.mit.edu

first began quantifying the extent of source verification in 2005.
We've amassed several years worth of data -- data that has become
particularly interesting in light of recent attacks.  However, our
data raised as many questions as it answered.  Hence, we have
developed a new version of the tester designed to answer these
questions and improve our Internet-wide inferences.

What's New:
  In addition to new tests, we've hooked into CAIDA's Ark
  infrastructure which allows us to perform multiple
  path-based measurements.  This information is presented to
  the client now in visual form; see the screenshots for an
  example report:
     http://spoofer.csail.mit.edu/example/example.php

How you can help:
  Simple -- take a few minutes to download and run the
  tester.  The more points you can run the tester from, the
  better.

Comments/Flames:
  Welcome, and we appreciate all feedback.  Be sure to read
  the FAQ:  http://spoofer.csail.mit.edu/faq.php

Many thanks,

rob
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 197 bytes
Desc: not available
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20090331/4b147978/attachment.bin>


More information about the NANOG mailing list