In message <DB7PR10MB215431CFDAB4554CBF6F9E85D6AA0@DB7PR10MB2154.EURPRD1 0.PROD.OUTLOOK.COM>, Elad Cohen <elad@netstyle.io> writes
if I will have the honor of being elected to the Ripe Board I will
[...]
At the source BGP router, for any ip packet with a source address that is from the network of the source BGP router (lets call it original ip packet) - the source BGP router will create a new ip packet (lets call it tracking ip packet) with a new transport layer protocol and with the same source address and with the same destination address and with the same IP-ID such as the original ip packet.
etc this appears to be a technically inferior adaptation of a 20 year old proposal from Steve Bellovin https://academiccommons.columbia.edu/doi/10.7916/D8FF406R it got zero traction then because it treats the issue as technical rather a complex security economics issue. Nothing, in my view, has changed in twenty years.
Automatic prventation of IoT botnet infections:
- IoT botnets are based on default credentials,
only some of them -- many exploit unpatched insecure protocol implementations
Automatic prventation of botnet C&C ip addresses:
- Botnets C&C are also a problem in the internet. - This problem can be overcome using the following technical addition: the 5 RIR's will operate end-users honeypots machines all over the world
you should keep up with my academic work on detecting honeypots (we found around 3000)... yes they are valuable, no they are not a panacea (and they are mainly poorly deployed... and we also found that many were not patched up-to-date [shoemaker's children?])
Very soon I will post a single solution to all the following problems: (implementation is fast and easy and I'll be very happy to manage the implementation in case I will be elected to the Ripe Board) * Spoofed ip traffic * Spoofed amplification ddos attacks * BGP&RIR hijacking * IoT botnet infections * Botnet C&Cs
I'm disappointed that you aren't solving the spam problem as well -- Dr Richard Clayton <richard.clayton@cl.cam.ac.uk> Director, Cambridge Cybercrime Centre mobile: +44 (0)7887 794090 Computer Laboratory, University of Cambridge, CB3 0FD tel: +44 (0)1223 763570