Novel hybrid schemes employing packet marking and logging for IP traceback

被引:51
作者
Al-Duwairi, B [1 ]
Govindarasu, M
机构
[1] Jordan Univ Sci & Technol, Fac Comp & Informat Technol, Dept Comp Engn, Irbid 22110, Jordan
[2] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50011 USA
基金
美国国家科学基金会;
关键词
Internet security; DDoS attacks; IP traceback;
D O I
10.1109/TPDS.2006.63
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Tracing DoS attacks that employ source address spoofing is an important and challenging problem. Traditional traceback schemes provide spoofed packets traceback capability either by augmenting the packets with partial path information (i.e., packet marking) or by storing packet digests or signatures at intermediate routers (i.e., packet logging). Such approaches require either a large number of attack packets to be collected by the victim to infer the paths (packet marking) or a significant amount of resources to be reserved at intermediate routers (packet logging). We adopt a hybrid traceback approach in which packet marking and packet logging are integrated in a novel manner, so as to achieve the best of both worlds, that is, to achieve a small number of attack packets to conduct the traceback process and a small amount of resources to be allocated at intermediate routers for packet logging purposes. Based on this notion, two novel traceback schemes are presented. The first scheme, called Distributed Link-List Traceback (DLLT), is based on the idea of preserving the marking information at intermediate routers in such a way that it can be collected using a link list-based approach. The second scheme, called Probabilistic Pipelined Packet Marking (PPPM), employs the concept of a " pipeline" for propagating marking information from one marking router to another so that it eventually reaches the destination. We evaluate the effectiveness of the proposed schemes against various performance metrics through a combination of analytical and simulation studies. Our studies show that the proposed schemes offer a drastic reduction in the number of packets required to conduct the traceback process and a reasonable saving in the storage requirement.
引用
收藏
页码:403 / 418
页数:16
相关论文
共 20 条
[1]  
ALDUWAIRI B, 2004, P IEEE INT C COMP CO
[2]  
[Anonymous], 2000, P 2000 ACM SIGCOMM C
[3]  
[Anonymous], 2000, ICMP TRACEBACK MESSA
[4]   Tracing network attacks to their sources [J].
Baba, T ;
Matsuda, S .
IEEE INTERNET COMPUTING, 2002, 6 (02) :20-26
[5]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[6]  
Burch H, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE FOURTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIV), P319
[7]  
DANIELS TE, 2002, THESIS PURDUE U W LA
[8]  
Dean D., 2001, P NETW DISTR SYST SE
[9]  
GOODRICH MT, 2002, P ACM C COMP COMM SE
[10]  
HSU F, 2003, P 23 IEEE INT C DIST