Efficient Single-packet Traceback Approach Based on Alliance Theory

被引:0
作者
Lu N. [1 ,2 ]
Zhang J.-W. [2 ]
Ma J.-F. [2 ]
Cheng Q.-F. [3 ]
Zhang J.-W. [2 ]
Wang S.-G. [4 ]
机构
[1] School of Computer Science and Engineering, Northeastern University, Shenyang
[2] School of Cyber Engineering, Xidian University, Xi'an
[3] State Key Laboratory of Mathematical Engineering and Advanced Computing, PLA Strategic Support Force Information Engineering University, Zhengzhou
[4] State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing
来源
Ruan Jian Xue Bao/Journal of Software | 2020年 / 31卷 / 12期
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Deployability; Internet; IP anonymity; Network security; Single-packet traceback;
D O I
10.13328/j.cnki.jos.005882
中图分类号
学科分类号
摘要
Single-packet traceback, as a key technology to solve the network security management issues caused by the "statelessness" of IP protocol, has drawn significant attentions in recent years. However, the prior work has not been widely used due to the following disadvantages: 1) inability to deploy incrementally; 2) lack of deployment incentives, i.e., none deployer can gain free riding; 3) high maintenance costs. This study proposes an efficient single-packet traceback approach based on alliance theory termed as TIST. It firstly establishes the traceability alliance on the large scale networks, so as to remove free-rider ASes and improve the deployment incentives. Secondly, it designs link fingerprint establishment strategy towards traceability alliance through combining IP stream labeling and peer-to-peer filtering technics, which can weaken the traceability coupling between autonomous domains and achieve incremental deployment. Finally, it defines a novel counting Bloom Filter towards network prefixes. By optimizes its parameters, the traceable routers can quickly identify the traceable packets, and achieve the selective establishment of link fingerprints. Extensive mathematical analysis and simulations are performed to evaluate the proposed approach. The results show that the proposed approach significantly out performs the prior approaches in terms of the deploy ability. © Copyright 2020, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:3880 / 3908
页数:28
相关论文
共 18 条
  • [1] Lu N, Hu WH., SAFE: A scalable filter-based packet filtering scheme, China Communications, 13, 2, pp. 163-177, (2016)
  • [2] Lu N, Wang YL, Su S, Yang FC., Filtering location optimization for the reactive packet filtering, Security and Communication Networks, 7, 7, pp. 1150-1164, (2014)
  • [3] Lu N, Wang Y, Shi W., Filtering location optimization for defending against large-scale BDoS attacks, Chinese Journal of Electronics, 26, 2, pp. 435-444, (2017)
  • [4] Cheng L, Divakaran DM, Ang WK., FACT: A framework for authentication in cloud-based IP traceback, IEEE Trans. on Information Forensics & Security, 2017, 99, pp. 604-616, (2017)
  • [5] Nur AY, Tozal ME., Record route IP traceback: Combating DoS attacks and the variants, Computers & Security, 72, pp. 13-25, (2018)
  • [6] Aghaei-Foroushani V, Zincir-Heywood AN., IP traceback through (authenticated) deterministic flow marking: An empirical evaluation, Eurasip Journal on Information Security, 2013, 1, pp. 1-24, (2013)
  • [7] Yu S, Zhou W, Guo S, Et al., A feasible IP traceback framework through dynamic deterministic packet marking, IEEE Trans. on Computers, 65, 5, pp. 1418-1427, (2016)
  • [8] Gong C, Sarac K., A more practical approach for single-packet IP traceback using packet logging and marking, IEEE Trans. on Parallel and Distributed Systems, 19, 10, pp. 1310-1324, (2008)
  • [9] Vijayalakshmi M, Shalinie SM, Ming-Hour Y., HPSIPT: A high-precision single-packet IP traceback scheme, Computer Networks, 143, pp. 275-288, (2018)
  • [10] Lu N, Wang YL, Su S, Yang FC., A novel path-based approach for single-packet IP traceback, Security and Communication Networks, 7, 2, pp. 309-321, (2013)