Comparative Evaluation of Spoofing Defenses

@article{Mirkovic2011ComparativeEO,
  title={Comparative Evaluation of Spoofing Defenses},
  author={Jelena Mirkovic and Ezra Kissel},
  journal={IEEE Transactions on Dependable and Secure Computing},
  year={2011},
  volume={8},
  pages={218-232}
}
IP spoofing exacerbates many security threats, and reducing it would greatly enhance Internet security. Seven defenses that filter spoofed traffic have been proposed to date; three are designed for end-network deployment, while four assume some collaboration with core routers for packet marking or filtering. Because each defense has been evaluated in a unique setting, the following important questions remain unanswered: 1) Can end networks effectively protect themselves or is core support… CONTINUE READING
Highly Cited
This paper has 26 citations. REVIEW CITATIONS