Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks

被引:91
作者
Xiang, Yang [1 ,2 ]
Zhou, Wanlei [3 ]
Guo, Minyi [4 ]
机构
[1] Cent Queensland Univ, Sch Management & Informat Syst, Rockhampton, Qld 4702, Australia
[2] Cent Queensland Univ, Ctr Intelligent & Networked Syst, Rockhampton, Qld 4702, Australia
[3] Deakin Univ, Sch Informat Technol, Fac Sci & Technol, Melbourne, Vic, Australia
[4] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
基金
澳大利亚研究理事会; 中国国家自然科学基金;
关键词
DDoS attacks; IP traceback; performance evaluation; routers; security;
D O I
10.1109/TPDS.2008.132
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet Protocol (IP) traceback is the enabling technology to control Internet crime. In this paper, we present a novel and practical IP traceback system called Flexible Deterministic Packet Marking (FDPM) which provides a defense system with the ability to find out the real sources of attacking packets that traverse through the network. While a number of other traceback schemes exist, FDPM provides innovative features to trace the source of IP packets and can obtain better tracing capability than others. In particular, FDPM adopts a flexible mark length strategy to make it compatible to different network environments; it also adaptively changes its marking rate according to the load of the participating router by a flexible flow-based marking scheme. Evaluations on both simulation and real system implementation demonstrate that FDPM requires a moderately small number of packets to complete the traceback process; add little additional load to routers and can trace a large number of sources in one traceback process with low false positive rates. The built-in overload prevention mechanism makes this system capable of achieving a satisfactory traceback result even when the router is heavily loaded. The motivation of this traceback system is from DDoS defense. It has been used to not only trace DDoS attacking packets but also enhance filtering attacking traffic. It has a wide array of applications for other security systems.
引用
收藏
页码:567 / 580
页数:14
相关论文
共 48 条
[1]   Trade-offs in probabilistic packet marking for IP traceback [J].
Adler, M .
JOURNAL OF THE ACM, 2005, 52 (02) :217-244
[2]   Novel hybrid schemes employing packet marking and logging for IP traceback [J].
Al-Duwairi, B ;
Govindarasu, M .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2006, 17 (05) :403-418
[3]  
Aljifri H., 2003, IEEE Security & Privacy, V1, P24, DOI 10.1109/MSECP.2003.1203219
[4]  
[Anonymous], 1968, An introduction to probability theory and its applications
[5]   Tracing network attacks to their sources [J].
Baba, T ;
Matsuda, S .
IEEE INTERNET COMPUTING, 2002, 6 (02) :20-26
[6]   On IP traceback [J].
Belenky, A ;
Ansari, N .
IEEE COMMUNICATIONS MAGAZINE, 2003, 41 (07) :142-153
[7]   IP traceback with deterministic packet marking [J].
Belenky, A ;
Ansari, N .
IEEE COMMUNICATIONS LETTERS, 2003, 7 (04) :162-164
[8]   On deterministic packet marking [J].
Belenky, Andrey ;
Ansari, Nirwan .
COMPUTER NETWORKS, 2007, 51 (10) :2677-2700
[9]  
BELLOVIN S, 2000, ICMP TRACEB IN PRESS
[10]  
Binstock A, 1995, PRACTICAL ALGORITHMS