.

Source Address Validation Survey

Note: 

Source Address Validation (SAV) is one important way to mitigate source address spoofing attacks in the data plane. As defined in MANRS Action 2 (https://manrs.org/netops/network-operator-actions/): Prevent traffic with spoofed source IP addresses – Filtering: A network operator should implement a system that enables source address validation for their own infrastructure and end users, and for any Stub Customer Networks. This should include anti-spoofing filtering to prevent packets with an incorrect source IP address from entering or leaving the network.


We assure all participants that individual responses will be kept confidential. Data will be aggregated and analyzed to understand broader trends, without identifying or disclosing specific details about any single network's security configurations. All collected data will be stored securely, with access limited to the research team.


Contact Email: yusc22@mails.tsinghua.edu.cn

Secured
Source Address Validation Survey
1

Your AS Number

2

Name of Organization

3

Did you know about Source Address Validation (SAV) before?

4

Have you implemented Filter or Source Address Validation (SAV) in your network?

Source Address Validation Survey
5

Are there any limitations or concerns that have impacted your SAV deployment?

e.g. multihoming, difficult to manage, false filtration...
6

Are you planning to implement SAV in the future?

Source Address Validation Survey
7

Have you implemented SAV in both IPv4 and IPv6?

8

Do you filter outbound or inbound traffic?

Outbound: traffic that comes from inside the network. Inbound: traffic that comes from outside the network.
9

Where have you deployed SAV?

10

What are the reasons you chose to deploy here?

e.g. limited by the network topology, easy to manage...
11

What types of SAV filtering techniques are you using?

ACL: explicitly permit or deny traffic based on source IP addresses. uRPF: ensure a packet's source can be reached via the path it came from.
12

What challenges have you encountered in implementing SAV?

e.g. multihoming, difficult to manage, false filtration...
Source Address Validation Survey
13

How effective do you believe SAV is in mitigating IP spoofing and DoS attacks in networks?

10 indicates extremely effective, while 1 indicates completely ineffective.
14

We are conducting a large-scale study on SAV deployment probing. Would you be interested in receiving the results for your network in the future?