Across-domain deterministic packet marking for IP traceback

被引:0
作者
Jin, Guang [1 ]
Yang, Jiangang [1 ]
Wei, Wei [1 ]
Dong, Yabo [1 ]
机构
[1] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310027, Peoples R China
来源
2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2 | 2007年
关键词
Internet security; DoS; IP traceback; deterministic packet marking;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Among IP traceback techniques, deterministic packet marking (DPM) can locate the ingress border routers of destination domains with sound effectiveness and robustness. Yet DPM is inefficient to trace to attack origins of remote domains. A novel mechanism, across-domain deterministic packet marking (ADDPM), for IP traceback is proposed. It uses the 30-bit space in IP header reserved for fragmented traffic. Three deterministic markings are recorded into a packet at both the ingress router of source domain and the border router of destination domain respectively. Besides the both routers' IP addresses, the source AS number is also marked. The victim can trace to the remote attack origin by the markings. Deterministic markings can also be used to differentiate malicious packets. Theoretical analyses, deployment policies and simulation results are provided in detail and show the effectiveness of ADDPM.
引用
收藏
页码:353 / 357
页数:5
相关论文
共 14 条
  • [1] [Anonymous], 2000, P 2000 ACM SIGCOMM C
  • [2] IP traceback with deterministic packet marking
    Belenky, A
    Ansari, N
    [J]. IEEE COMMUNICATIONS LETTERS, 2003, 7 (04) : 162 - 164
  • [3] BELENKY A, 2003, P IEEE PAC RIM C COM
  • [4] DDoS attacks and defense mechanisms: classification and state-of-the-art
    Douligeris, C
    Mitrokotsa, A
    [J]. COMPUTER NETWORKS, 2004, 44 (05) : 643 - 666
  • [5] A practical and robust inter-domain marking scheme for IP traceback
    Gao, Zhiqiang
    Ansari, Nirwan
    [J]. COMPUTER NETWORKS, 2007, 51 (03) : 732 - 750
  • [6] Tracing cyber attacks from the practical perspective
    Gao, ZQ
    Ansari, N
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2005, 43 (05) : 123 - 131
  • [7] GONG C, 2006, P BROADNETS SAN JOS
  • [8] Deterministic packet marking based on redundant decomposition for IP traceback
    Jin, Guang
    Yang, Jiangang
    [J]. IEEE COMMUNICATIONS LETTERS, 2006, 10 (03) : 204 - 206
  • [9] KIM Y, 2003, P IEEE GLOB DEC
  • [10] Inferring Internet denial-of-service activity
    Moore, David
    Shannon, Colleen
    Brown, Douglas J.
    Voelker, Geoffrey M.
    Savage, Stefan
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2006, 24 (02): : 115 - 139