[NLNOG] (no subject)

TU Delft - infospoofing project infospoofing at tudelft.nl
Wed Mar 14 10:57:35 CET 2018


Every day, attackers exploit IP spoofing for their criminal operations. Despite being a known vulnerability for at least 25 years, IP source address spoofing still remains a popular attack method for redirection, amplification, and anonymity attacks. This situation persists partially because of the lack of visibility into which operators lack adequate anti-spoofing measures -- that is, their networks are not compliant with BCP38 and related norms.


In the effort to help increase the adoption of anti-spoofing measures, researchers from TU Delft and CAIDA have been conducting measurements on which networks are compliant. We would like to engage the network operator community to reach out to non-compliant operators and instigate remediating actions.


We have created an overview of our findings on networks in the Netherlands. You can see them on our website:

https://www.infospoofing.com/nl/ID=68


The good news is: over 90% of Dutch operators have measures in place against IP spoofing! We would like to ask your help to get the remaining 6% on board. Feel free to share the link to our website or otherwise help mobilize the non-compliant operators. At our site, you can also find more information about anti-spoofing best practices as articulated by the MANRS initiative.


Help us to make the Netherlands a spoofing-free country!


Best regards,

Orcun Cetin,

Luigi Tuttobene,

Carlos Gañán,

Michel van Eeten


Researchers at Delft University of Technology

---

Faculteit Techniek, Bestuur en Management

TU Delft Postbus 5015, 2600GA Delft

+31 (0)15 27 88784
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.nlnog.net/pipermail/nlnog/attachments/20180314/cd337bff/attachment.html>


More information about the NLNOG mailing list