Is a block spoof IP filter in hardware (VHDL design) is required

Discussion in 'VHDL' started by bknpk, Aug 13, 2013.

  1. bknpk

    bknpk Guest

    IP TTL spoofed packet block in VHDL

    I read recently, that some linux kernels have the ability to block spoofed packets. Some hackers attack servers by sending many packets. They also putsome fake data in the offending packets. The arrival of multiple packets, with a well known source IP, in the spoofed packet, causes many interrupts in the server. This, in the best case, results with a degraded performance.Some kernels try to counter attack with an IP TTL block spoofed filter. I have decided to build such a filter in hardware. I would like to do the jobin hardware (VHDL design), therefor offloading the kernel from this job. The idea is to have two main states in hardware machine, per each incoming IP namely: learning and check. In the former the hardware machine will builda table, per each incoming source IP, where it will average the TTL valuesof the packet. Once a programmable number of TTL values, for a given packet, have been studied, the hardware (VHDL design) machine switches to check mode. During check mode, if a packet arrives and its TTL is outside an allowable range, a block packet indication is set. Such an implementation requires memory. With the way the design is implemented any memory smaller than 32 bits addressable, for IPV4, can be used.

    Is a block spoof IP filter in hardware (VHDL design) is required.
    Please share your thoughts.
    bknpk, Aug 13, 2013
    1. Advertisements

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.