IP traceback marking scheme based packets filtering mechanism

被引:2
作者
Ping, SY [1 ]
Lee, MC [1 ]
机构
[1] Chinese Univ Hong Kong, Hong Kong, Hong Kong, Peoples R China
来源
2004 IEEE Workshop on IP Operations and Management Proceedings (IPOM 2004): SELF-MEASUREMENT & SELF-MANAGEMENT OF IP NETWORKS & SERVICES | 2004年
关键词
DDoS attacks; IP traceback; probabilistic packet marking; inter-domain marking; source router;
D O I
10.1109/IPOM.2004.1547625
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Denial of Service attacks have become one of the most serious threats to the Internet community. One effective means to defend against such attacks is to locate the attack source(s) and to filter out the attack traffic. To locate the attack source(s), this paper proposes an adaptive packet marking scheme for IP traceback, which supports two types of marking. A participating border router would perform deterministic router id marking when a packet enters the network for the first time, and probabilistic domain id marking when it receives a packet from another domain. After collecting sufficient packets, the victim would reconstruct the attack graph incorporating attack paths and the source router(s) identified, with each node on the paths viewed as a domain. Based on the attack graph traced back, we propose to let the filtering agent(s) inspect the markings inscribed in the received packets and filter the packets with a marking matching with the attack signatures. Simulation results show that the proposed marking scheme outperforms other IP traceback methods as it requires fewer packets for attack paths reconstruction, and can handle large number of attack sources effectively with relatively low false positives produced. Meanwhile, with the attack packets filtering mechanism, around 80% attack traffic would be removed and the normal traffic can be efficiently preserved in order to restore the victim's service.
引用
收藏
页码:253 / 260
页数:8
相关论文
共 14 条
[1]  
[Anonymous], 2000, IETF
[2]  
BASS SH, SPOOF IP ADDR DISTR
[3]  
BELENKY A, 2003, IEEE COMMUNICATIONS, V41
[4]  
BELENKY A, 2003, IEEE COMMUNICATIONS, V7
[5]  
Bellovin S., ICMP TRACEBACK MESSA
[6]  
BURCH H, UNPUB TRAC AN PACK T
[7]  
CHANG RKC, IEEE COMMUNICATI OCT
[8]  
DAWN X, P IEEE INF C APR 200
[9]  
Dean D., 2001, P NETW DISTR SYST SE, P3
[10]  
HOULE KJ, TECHNICAL REPORT CER