FINDING · DEFENSE

Beverly et al. found that 77% of Internet clients can spoof source addresses within their own /24 and 11% can spoof within their own /16, with these characteristics holding across a wide range of countries and regions. The authors use this result to argue that IP-spoofed cover traffic — where measurement probes appear to originate from many hosts in the same AS — is broadly feasible in practice.

From 2015-jones-canCan Censorship Measurements Be Safe(r)? · §4.2 · 2015 · Hot Topics in Networks

Implications

Tags

censors
generic
defenses
mimicryrandomization

Extracted by claude-sonnet-4-6 — review before relying.