This is a continuation of Internet Address Hijacking, Spoofing, and Squatting Attacks.
Criminals or miscreants need public IP addresses for the hosts they use to conduct a variety of criminal or activities such as spam, phishing, or denials of service. Historically, spoofing IP addresses served these bad actors well. Techniques to detect and thwart address spoofing must improve. Classifying these methods serves to show how criminals target and victimize Regional Internet Registries or their customer-registrants. By distinguishing the attacks as well as the victims using the taxonomy described in this paper, we can better identify protective measures RIRs, registrants, and IP network operators can implement to reduce the threat of IP address attacks.
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Comments
You can follow this conversation by subscribing to the comment feed for this post.