A World-View of IP Spoofing in L4 Volumetric DDoS Attacks
This talk analyzes the prevalence and mechanics of IP source address spoofing in Layer-4 volumetric DDoS attacks using global network telemetry. It evaluates the effectiveness of BCP-38 (Source Address Validation) and Unicast Reverse Path Filtering (uRPF) in mitigating these attacks across diverse autonomous systems. The research demonstrates that while spoofing remains a significant vector for amplification attacks, it can be detected at the server side using anycast catchments and packet feature analysis. The findings highlight the limitations of current mitigation strategies and the ongoing challenge of tracing back spoofed traffic in a borderless internet.
Why IP Spoofing Still Rules the Volumetric DDoS Landscape
TLDR: Despite decades of industry efforts to implement BCP-38, IP source address spoofing remains a primary driver for massive Layer-4 volumetric DDoS attacks. Research using global network telemetry shows that attackers leverage reflection and amplification vectors to bypass simple filtering, often using insecure IoT devices as unwitting proxies. Security teams must move beyond basic ingress filtering and adopt more sophisticated traffic analysis techniques to identify and mitigate these spoofed flows at the edge.
Network-layer DDoS attacks are often dismissed as a solved problem, relegated to the "noise" category of security operations. The reality is far more dangerous. While application-layer attacks grab headlines for their complexity, Layer-4 volumetric attacks continue to break bandwidth records, frequently exceeding 3.5 terabits per second. These attacks rely on a fundamental weakness in the internet architecture: the ability to forge source IP addresses.
The Mechanics of Spoofing at Scale
At the core of these massive attacks is the exploitation of reflection and amplification. An attacker sends a small request to a vulnerable server—often an IoT device or a misconfigured service—with the source IP address spoofed to match the victim's IP. The server then sends a significantly larger response to the victim. Because the attacker never needs to establish a full TCP handshake, they can remain anonymous while directing massive amounts of traffic toward a target.
The research presented at Black Hat 2023 highlights that this technique is not just a theoretical concern. By analyzing global traffic patterns, researchers identified that spoofed packets are pervasive. The primary defense mechanism, BCP-38, is designed to force ISPs to drop packets that do not originate from the network's assigned IP space. However, adoption remains inconsistent. Even in regions with high BCP-38 compliance, spoofed traffic still leaks through, often originating from complex, multi-homed networks where traffic engineering makes strict filtering difficult.
Detecting Spoofing via Anycast Catchments
For a pentester or a security researcher, the challenge is identifying which traffic is spoofed when you are sitting at the server side. Traditional ingress filtering is a black box. The research suggests a more surgical approach: using anycast catchments.
Anycast networks advertise the same IP prefix from multiple points of presence (PoPs). By mapping which IP prefixes are routed to specific PoPs, you can create a baseline of "legitimate" traffic sources. If you receive traffic from an IP address that, according to your BGP routing tables, should never be routed to that specific PoP, you have a high-confidence indicator of a spoofed packet.
This method allows for the creation of a "signature" for spoofed traffic. By analyzing packet features—such as TTL values, TCP window sizes, and payload characteristics—you can build a profile of the attack. Once you have this profile, you can apply it to the rest of the traffic within the catchment to identify other spoofed flows that might not be as obvious.
Real-World Implications for Pentesters
If you are conducting a red team engagement or a penetration test, understanding these mechanics is critical. When testing the resilience of a network against DDoS, do not just rely on standard flood tools. Instead, simulate the reflection and amplification vectors that characterize modern attacks.
Tools like Spoofer, developed by CAIDA, are essential for testing whether a network is capable of sending spoofed packets. If you can successfully send a spoofed packet out of a client's network, you have identified a significant vulnerability that could be used to launch an attack against a third party, potentially leading to legal and reputational fallout for your client.
Furthermore, when analyzing a target's infrastructure, look for misconfigured services that could be used as amplifiers. Common targets include DNS, NTP, and SSDP services. If you find these services exposed and misconfigured, they are not just vulnerabilities for the target; they are potential weapons for an attacker.
The Defensive Reality
Defending against these attacks requires a multi-layered approach. While BCP-38 is the gold standard, it is not a silver bullet. Network operators must also implement Unicast Reverse Path Filtering (uRPF) to drop packets that do not have a valid return path. However, as the research shows, asymmetric routing can lead to false positives, causing legitimate traffic to be dropped.
The most effective defense is a combination of edge filtering and intelligent traffic analysis. By monitoring traffic at the PoP level and using anycast catchments to validate source IPs, organizations can significantly reduce the impact of spoofed volumetric attacks.
The internet remains a borderless environment, and as long as source IP addresses can be easily forged, volumetric DDoS attacks will continue to be a potent threat. The goal for security professionals is not to eliminate the possibility of spoofing—which is likely impossible given the current state of global routing—but to make it as difficult and expensive as possible for attackers to succeed. Start by auditing your own network's egress filtering and ensuring that your infrastructure is not contributing to the problem.
Vulnerability Classes
Tools Used
Target Technologies
Attack Techniques
All Tags
Up Next From This Conference

A Security RISC? The State of Microarchitectural Attacks on RISC-V

REDIScovering HeadCrab: A Technical Analysis of a Novel Malware and the Mind Behind It

TsuKing: Coordinating DNS Resolvers and Queries into Potent DDoS Amplifiers
Similar Talks

Tor: A Decade of Lessons

What To Expect When You're Exploiting: Attacking and Discovering Zero-Days in Baby Monitors and Wi-Fi Cameras

