Skip to Content
[CAIDA - Center for Applied Internet Data Analysis logo]
Center for Applied Internet Data Analysis > publications : papers : 2019 : challenges_inferring_spoofed_traffic
Challenges in Inferring Spoofed Traffic at IXPs
L. Müller, M. Luckie, B. Huffaker, k. claffy, and M. Barcellos, "Challenges in Inferring Spoofed Traffic at IXPs", in ACM SIGCOMM Conference on emerging Networking EXperiments and Technologies (CoNEXT), Dec 2019.
|   View full paper:    PDF    DOI    Related Presentation    |  Citation:    BibTeX   |

Challenges in Inferring Spoofed Traffic at IXPs

Lucas Müller1, 2
Matthew Luckie3
Bradley Huffaker1
kc claffy1
Marinho Barcellos2, 3

CAIDA, San Diego Supercomputer Center, University of California San Diego


Universidade Federal do Rio Grande do Sul (UFRGS)


University of Waikato

Ascertaining that a network will forward spoofed traffic usually requires an active probing vantage point in that network, effectively preventing a comprehensive view of this global Internet vulnerability. Recently, researchers have proposed using Internet Exchange Points (IXPs) as observatories to detect spoofed packets, by leveraging Autonomous System (AS) topology knowledge extracted from Border Gateway Protocol (BGP) data to infer which source addresses should legitimately appear across parts of the IXP switch fabric. We demonstrate that the existing literature does not capture several fundamental challenges to this approach, including noise in BGP data sources, heuristic AS relationship inference, and idiosyncrasies in IXP interconnectivity fabrics. We propose a novel method to navigate these challenges, leveraging customer cone semantics of AS relationships to guide precise classification of inter-domain traffic as in-cone, out-of-cone (spoofed), unverifiable, bogon, and unassigned. We apply our method to a mid-size IXP with approximately 200 members, and find an upper bound volume of out-of-cone traffic to be more than an order of magnitude less than the previous method inferred on the same data. Our work illustrates the subtleties of scientific assessments of operational Internet infrastructure, and the need for a community focus on reproducing and repeating previous methods.

Keywords: active data analysis, routing, security, topology
  Last Modified: Tue Jul-28-2020 14:29:49 UTC
  Page URL: