IP Traceback Algorithm Based on Deterministic Linear Network Coding

被引:0
作者
Yan, Qiao [1 ]
Lu, Nan [1 ]
Ning, Tu-Wen [2 ]
Yao, Xi-Yan [1 ]
Li, Bao-Guang [1 ]
机构
[1] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen, Peoples R China
[2] Shenzhen Univ, Coll Informat Engn, Shenzhen, Peoples R China
来源
2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS) | 2014年
关键词
IP traceback; Network Coding; Probabilistic packet marking (PPM); DDoS;
D O I
10.1109/CIS.2014.51
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A new algorithm, IP traceback algorithm based on deterministic linear network coding (DLNC) is proposed. The new algorithm applies the deterministic linear network coding to the probabilistic packet marking algorithm. Theoretical analysis and simulation in NS2 environment show that the new algorithm reduces the amount of packet needed to reconstruct the attack path, improves the computational complexity of reconstruction and false alarm rate.
引用
收藏
页码:397 / 401
页数:5
相关论文
共 10 条
[1]   Network information flow [J].
Ahlswede, R ;
Cai, N ;
Li, SYR ;
Yeung, RW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1204-1216
[2]   Network Coding Theory: A Survey [J].
Bassoli, Riccardo ;
Marques, Hugo ;
Rodriguez, Jonathan ;
Shum, Kenneth W. ;
Tafazolli, Rahim .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (04) :1950-1978
[3]   Dynamic Probabilistic Packet Marking Based On PPM [J].
Bo, Feng ;
Fan, Guo ;
Min, Yu .
PROCEEDINGS OF THE 2009 SECOND PACIFIC-ASIA CONFERENCE ON WEB MINING AND WEB-BASED APPLICATION, 2009, :289-292
[4]  
Gonsalves A., 2013, PRICES FALL SERVICES
[5]  
Sattari P., 2010, 2010 IEEE INT S NETW, P1
[6]   Network support for IP traceback [J].
Savage, S ;
Wetherall, D ;
Karlin, A ;
Anderson, T .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2001, 9 (03) :226-237
[7]  
TAO S.-G., 2008, J CHINESE COMPUTER S, V29, P584
[8]  
Xiao-jing W., 2009, IEEE 2 INT WORKSH CO, V1, P151
[9]   RIHT: A Novel Hybrid IP Traceback Scheme [J].
Yang, Ming-Hour ;
Yang, Ming-Chien .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) :789-797
[10]   Traceback of DDoS Attacks Using Entropy Variations [J].
Yu, Shui ;
Zhou, Wanlei ;
Doss, Robin ;
Jia, Weijia .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (03) :412-425