Why can’t ISPs block spoofed packets?

Posted on Jun 20 2014 - 1:39pm by Contributing Writer

By Hemant Jain, Fortinet

It’s no secret that most DNS reflection attacks flooding the Internet today are caused by spoofing the source address. SYN floods, for example, are spoofed TCP floods, in which the source of the IP packets appears to be different than their actual origin. And according to industry statistics, SYN floods are the second most popular DDoS infrastructure attack vector, comprising around 15 percent of all attacks.

Similarly, UDP and ICMP floods are attacks that are also easily spoofed. UDP floods, in fact, represent the highest percentage of protocols used for DDoS attacks, hovering at around 30 percent.

The same is true for cloud data centers that house numerous Internet-facing servers. If these servers are compromised, they too can send spoofed packets.

Now, if these kinds of attacks are so serious, one would think that ISPs would simply stop them at the source. All ISPs know their customers’ network addresses and in theory, can easily enforce anti-spoofing policies on all packets.Smurf_01

Also, while ISPs may not typically be the primary targets of an attack, it’s certainly within the realm of possibility. Among other things, the benefit to ISPs would include reduced bandwidth and related costs, as well as having imminent threats filtered out by other ISPs. Ideally, the benefits would be enough to compel an increase in social cooperation and collective responsibility throughout the industry.

In short, if all ISPs regularly blocked spoofed packet egress from their network to their peers, the world would be a safer and more peaceful place.

READ:  Trend Micro introduces Windows 10-compatible security software

Then why don’t they do it? Well, for several reasons.

The primary reason is related to the architecture of the Internet routers. High speed routers that face the Internet are designed to forward packets with the lowest latency. In a sense, it would be like requiring car registration verification for every car on the freeway entrance – a move that would potentially bring traffic to a standstill.

Likewise, unless ISPs implement more expensive routers, Internet traffic would almost definitely experience severe latency if anti-spoofing was conducted at the edge.

Additionally, the effort requires provisioning every router with its own anti-spoofing list, which in turn, makes the security process specific to every router. Not surprisingly, this also increases costs while further complicating centralized management.

There is, of course, a beacon of light in this dim tunnel. Fortinet’s FortiDDoS protects from such spoofed packets via its hardware anti-spoofing engine for TCP as well as numerous granular controls available for other protocols.

But until the cloud data centers and ISPs figure out a strong and plausible economic business case for anti-spoofing at egress and ingress respectively, the customers will need to rely on 3rd party solutions to mitigate DDoS attacks.

Related Posts

Sophos offers top cyber security predictions for 2... In the ever changing and increasingly complex landscape of cyber security, Sophos experts offer their top predictions for 2016: Android threats wil...
PH’s first DDoS attack scrubbing center goes live... The country’s first locally hosted DDoS (Distributed Denial of Service) attack scrubbing center has been switched on by IPC (IP Converge Data Services...
Malicious apps use Facebook accounts to spread RIP... The rise of “rest in peace” scam messages on social media sites continues, warns Symantec. Jackie Chan, Morgan Freeman, Will Smith, Keanu Reeves, and ...
Massive underground market selling over 70,000 hac... There is a global forum where cybercriminals can buy and sell access to compromised servers for as little as $6 each, according to Kaspersky Lab. T...
In 2014, cybercriminals will target your money and... Kaspersky Lab has revealed its predictions for 2014. Not surprisingly, much of what they have seen in their crystal balls is connected to the fallout ...
Business execs staying in ‘Darkhotels’... For at least four years already, a "Darkhotel" espionage campaign has been lurking in the shadows stealing sensitive data from selected corporate exec...
Malware generates fake ‘follows’ and &... A malware has been stealing HTTP cookies to perform fraudulent actions on Facebook, Twitter, Instagram, YouTube and other sites, which include generat...
Study finds multiple vulnerabilities in popular co... Before connecting other devices to that newly purchased smart appliance, read this. Popular connected home entertainment devices pose a real cyber ...
How much would a cyberattack cost your company? The Economist Intelligence Unit has launched an online tool that is designed to tally the bill from cyberattacks. Incidents of cybercrime are reported...
Study: Gen Y shun corporate BYOD and personal clou... There is a growing appetite of Generation Y (the generation born between the late 1970s and the mid 1990s) employees to contravene corporate policies ...
About the Author

Leave A Response