Novel hybrid schemes employing packet marking and logging for IP traceback

被引:50
|
作者
Al-Duwairi, B [1 ]
Govindarasu, M
机构
[1] Jordan Univ Sci & Technol, Fac Comp & Informat Technol, Dept Comp Engn, Irbid 22110, Jordan
[2] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50011 USA
基金
美国国家科学基金会;
关键词
Internet security; DDoS attacks; IP traceback;
D O I
10.1109/TPDS.2006.63
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Tracing DoS attacks that employ source address spoofing is an important and challenging problem. Traditional traceback schemes provide spoofed packets traceback capability either by augmenting the packets with partial path information (i.e., packet marking) or by storing packet digests or signatures at intermediate routers (i.e., packet logging). Such approaches require either a large number of attack packets to be collected by the victim to infer the paths (packet marking) or a significant amount of resources to be reserved at intermediate routers (packet logging). We adopt a hybrid traceback approach in which packet marking and packet logging are integrated in a novel manner, so as to achieve the best of both worlds, that is, to achieve a small number of attack packets to conduct the traceback process and a small amount of resources to be allocated at intermediate routers for packet logging purposes. Based on this notion, two novel traceback schemes are presented. The first scheme, called Distributed Link-List Traceback (DLLT), is based on the idea of preserving the marking information at intermediate routers in such a way that it can be collected using a link list-based approach. The second scheme, called Probabilistic Pipelined Packet Marking (PPPM), employs the concept of a " pipeline" for propagating marking information from one marking router to another so that it eventually reaches the destination. We evaluate the effectiveness of the proposed schemes against various performance metrics through a combination of analytical and simulation studies. Our studies show that the proposed schemes offer a drastic reduction in the number of packets required to conduct the traceback process and a reasonable saving in the storage requirement.
引用
收藏
页码:403 / 418
页数:16
相关论文
共 50 条
  • [41] LPM: A lightweight authenticated packet marking approach for IP traceback
    Patel, Hasmukh
    Jinwala, Devesh C.
    [J]. COMPUTER NETWORKS, 2018, 140 : 41 - 50
  • [42] Branch label based probabilistic packet marking for IP traceback
    Ogawa, T
    Nakamura, F
    Wakahara, Y
    [J]. ICON 2003: 11TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2003, : 467 - 474
  • [43] Robust and Scalable Deterministic Packet Marking Scheme for IP Traceback
    Lin, Iven
    Lee, Tsern-Huei
    [J]. GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [45] Across-domain deterministic packet marking for IP traceback
    Jin, Guang
    Yang, Jiangang
    Wei, Wei
    Dong, Yabo
    [J]. 2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 353 - 357
  • [46] Topology-assisted deterministic packet marking for IP traceback
    Laboratory of Computer Network Defense Technology, Beijing Institute of Technology, Beijing 100081, China
    不详
    [J]. J. China Univ. Post Telecom., 2 (116-121): : 116 - 121
  • [47] Trade-offs in probabilistic packet marking for IP traceback
    Adler, M
    [J]. JOURNAL OF THE ACM, 2005, 52 (02) : 217 - 244
  • [48] Probabilistic packet marking for large-scale IP traceback
    Goodrich, Michael T.
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2008, 16 (01) : 15 - 24
  • [49] IP Traceback through Modified Probabilistic Packet Marking Algorithm
    Bhavani, Y.
    Janaki, V.
    Sridevi, R.
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE OF IEEE REGION 10 (TENCON), 2013,
  • [50] A Probabilistic Packet Marking Scheme with LT Code for IP Traceback
    Lin, I-Long
    Peng, Shih-Hao
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (02): : 189 - 202