Internet Protocol (IP) attribution is the attempt to identify a device ID or individual responsible for a cyber attack (e.g. ransomware or other types of malware) based on the origin of a network packet.  

An IP address is given to a system for a period of time that enables them to exchange data to and from other devices on networks.

There are two major versions of IP today, IPv4 which has an address space of about 4 billion addresses and IPv6 which has about 340 undecillion, or 340 billion billion billion billion addresses. While 4 billion addresses sounds like a lot, IPv4 has been exhausted in many ways.

This has lead to a slow migration toward IPv6 addresses that most major networks and devices rely on today. 

Does IP Attribution Work?

It's often said every device has a unique IP address assignment and that address can be reliably used as an identifier. This is not true.

The perpetuation of this myth continues to detract from the public's understanding of how the Internet works, both in terms of its underlying protocols and how it can be made secure. 

Many believe that IP addresses are akin to fingerprints. However, there are key differences that need to be understood.

If humans could change their fingerprint from moment to moment, or even copy another person's fingerprint, there would be little value in finding and analyzing fingerprints. Fingerprints are useful for identifying malicious activity because they are unique and immutable. 

If they weren't, we wouldn't be able to depend on them for forensic investigations. 

Yet, this is exactly what happens in cyber security digital forensics with the practice  of IP attribution to determine the geographical location, device or individual response for a cybercrime.

In short:

  • There are common technologies that obscure who is tied to an IP address in real-time.
  • There are many less transient signatures than IP addresses.
  • Even if you can identify the device and its operating system, you may not be able to ascertain who was using it. 
  • Mobile devices and public networks like a guest wifi network allow unvetted access to the Internet, even if they protect against unauthorized access to more secure internal networks.
  • The IP address space is large and can be defunct or repurposed.
  • IP addresses can be shared.

A source IP is more accurately describe as the intended instructions of where to send a response to. There is nothing stopping the true sender of a network packet from marking the packet with an arbitrary or intentionally misleading IP address. 

If sent with a random source IP, the sender cannot expect to receive a reply from the destination (as the destination server will attempt to send the reply to the random address instead of the true origin).

However, this design does allow many forms of routing which complete the communication without informing hosts of the true origin's IP address. 

Are IP Addresses Spoofable? 

IP addresses are easily faked or "spoofed". This concept is not new or secret, a quick Google will show thousands of pages. You can read more about it on Wikipedia.

In fact, there are open source scripts available on GitHub showcasing the concept. As this project shows, the IP address originating a port scan “can also be faked.” 

IP attribution is useful for non-security related trend analysis. And this remains true only because the majority of Internet traffic has no desire to obfuscate their originating IP address.

The situation changes when the purpose of attribution is to identify individual devices, especially for threat intelligence rather than general analysis of large amounts of varied traffic. Most people doing normal things on the internet have no reason to fake their IP address, and indeed it would cause problems for them if they did. Ironically, most of the people motivated to do it are precisely the miscreants that IP attribution efforts would be trying to catch. 

How Do Cloud Services and Shared IP Addresses Affect IP Attribution?

The growing adoption of cloud hosted services and other shared-IP platforms compound the issues with IP attribution even further.

Many cheap cloud computing services do not provide a unique IP address to the client. The same is true for small and medium businesses who may share address space with their internet service provider (ISP).

Hosts can and will use a single IP address for multiple clients. Routing magic, subnets, CIDR (Classless Inter-Domain Routing) and network address translation make this possible.

If actions are attributed to entities solely on the source IP address, then it is feasible a cloud hosted instance could be lumped in and categorized according to the actions of a nefarious neighbouring instance on the same physical host run by someone else. 

Cloud services make it easy to rotate IPs, further increasing the likelihood of error in attribution.

Is the Value of Malicious Impersonation Increasing?

The most important reason to not rely on IP attribution is in relation to "Hack Back" legislation. 

This idea is again in the news with a new proposal from Representative Tom Graves “that would allow companies to go outside of their own networks to identify their attackers and possibly disrupt their activities.” 

If laws are ever passed allowing entities to return fire at perceived online attackers, IP addresses are likely to play a role in identifying who is pinned as the reverse target in incident response

Security professionals need to educate the public regarding the ease of IP address manipulation. Allowing entities to hack back will be bad if it creates opportunities for malicious individuals to trick much larger entities into attacking an innocent, mimicked victim.

Conclusion

Just as phishing and other forms of social engineering mimicry have become common knowledge, IP address manipulation needs to be part of public vernacular and not just talked about in information security circles. 

IP attribution has many problems ranging from the complexities of multi-tenant cloud environments to the ease of IP spoofing.

The fundamental fact is a packet's sender IP is under the sender's control and is not something that can be relied upon like a fingerprint. 

For low impact uses, IP attribution may be good enough but it isn't for security. 

Imagine a future where IP attribution is central to security decisions and understand how dangerous it is due to fundamental mutability.

We don't want to incentivize bad actors to exploit IP spoofing in the same way DDoS attacks have been. 

In the best case scenario, IP attribution data would become useless. But the more troubling scenario is feasible where innocuous IPs are blacklisted and unsuspecting businesses are crippled due to their undeserved IP reputation.

How UpGuard Can Improve Your Security Posture

There's no question that cybersecurity is more important than ever before. That's why companies like Intercontinental ExchangeTaylor FryThe New York Stock Exchange, IAG, First State Super, Akamai, Morningstar and NASA use UpGuard to protect their data and prevent data breaches.

We're experts in data breaches, in fact our data breach research has been featured in the New York TimesBloombergWashington PostForbes and Techcrunch.

UpGuard BreachSight can help combat typosquatting, prevent data breaches and data leaks, avoiding regulatory fines and protecting your customer's trust through cyber security ratings and continuous exposure detection. 

UpGuard Vendor Risk can minimize the amount of time your organization spends managing third-party relationships by automating vendor questionnaires and continuously monitoring your vendors' security posture over time while benchmarking them against their industry.

Ready to see
UpGuard in action?

Ready to save time and streamline your trust management process?