A Taxonomy and Comparative Analysis of IPv4 ID Selection Correctness, Security, and Performance

📅 2024-06-10
🏛️ arXiv.org
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
IPv4 Identification (IPID) fields have long been exploited in side-channel attacks—including network scanning, connection inference, and DNS cache poisoning—exposing systemic deficiencies in existing IPID selection mechanisms regarding correctness, security, and performance. Method: We introduce the first unified taxonomy of IPID selection methods, combining formal modeling, probabilistic analysis, and cross-platform empirical measurement to systematically evaluate 25 years of attack evolution and IPID implementations across mainstream operating systems. Contribution/Results: Our study identifies predictable IPID behaviors in multiple OS kernels, enabling practical side-channel exploitation. We quantify the fundamental security–performance trade-off inherent in IPID design and propose verifiable, RFC-compliant design principles that simultaneously mitigate side channels, minimize computational overhead, and preserve interoperability. The work establishes a rigorous theoretical foundation and actionable guidelines for securing IP stack implementations against IPID-based vulnerabilities.

Technology Category

Application Category

📝 Abstract
The battle for a more secure Internet is waged on many fronts, including the most basic of networking protocols. Our focus is the IPv4 Identifier (IPID), an IPv4 header field as old as the Internet with an equally long history as an exploited side channel for scanning network properties, inferring off-path connections, and poisoning DNS caches. This article taxonomizes the 25-year history of IPID-based exploits and the corresponding changes to IPID selection methods. By mathematically analyzing these methods' correctness and security and empirically evaluating their performance, we reveal recommendations for best practice as well as shortcomings of current operating system implementations, emphasizing the value of systematic evaluations in network security.
Problem

Research questions and friction points this paper is trying to address.

Analyze IPv4 Identifier (IPID) selection methods' correctness and security
Evaluate performance of IPID selection methods empirically
Provide recommendations for best practices in IPID implementation
Innovation

Methods, ideas, or system contributions that make the work stand out.

Taxonomizes 25-year history of IPID exploits
Mathematically analyzes correctness and security
Empirically evaluates performance of IPID methods
🔎 Similar Papers
No similar papers found.
Joshua J. Daymude
Joshua J. Daymude
SCAI & Biodesign Institute, Arizona State University
distributed algorithmsrandomized algorithmscomplex systemsprogrammable matter
A
Antonio M. Espinoza
Eastern Washington University, USA
S
Sean Bergen
Arizona State University, USA
B
Benjamin Mixon-Baca
Arizona State University, USA
J
Jeffrey Knockel
University of Toronto, Canada
J
Jedidiah R. Crandall
Arizona State University, USA