On Evaluating IP Traceback Schemes: A Practical Perspective

被引:9
作者
Aghaei-Foroushani, Vahid [1 ]
Zincir-Heywood, A. Nur [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS, Canada
来源
IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013) | 2013年
关键词
Flow Base IP Traceback; DDoS Attacks; Deterministic Flow Marking; Authenticated Flow Marking; MARKING;
D O I
10.1109/SPW.2013.13
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents an evaluation of two promising schemes for tracing cyber-attacks, the well-known Deterministic Packet Marking, DPM, and a novel marking scheme for IP traceback, Deterministic Flow Marking, DFM. First of all we explore the DPM in detail and then by investigating the DFM, we analyze the pros and cons of both approaches in depth in terms of practicality and feasibility, so that shortcomings of each scheme are highlighted. This evaluation is based on CAIDA Internet traces October 2012 dataset. The results show that using DFM may reduce as many as 90% of marked packets on average required for tracing attacks with no false positives, while it eliminates the spoofed marking embedded by the attacker as well as compromised routers in the attack path. Moreover, unlike DPM that traces the attack up to the ingress interface of the edge router close to the attacker, DFM allows the victim to trace the origin of incorrect or spoofed source addresses up to the attacker node, even if the attack has been originated from a network behind a network address translation (NAT), firewall, or a proxy server.
引用
收藏
页码:127 / 134
页数:8
相关论文
共 26 条
[1]  
Aghaei-Foroushani V, 2013, 27 IEEE INT C ADV IN
[2]  
Alshammari R., 2011, J COMPUTER NETWORKS
[3]  
[Anonymous], 2011, INTRO EC CRISIS WHAT
[4]  
[Anonymous], 2000, P 7 ACM C COMP COMM
[5]   On IP traceback [J].
Belenky, A ;
Ansari, N .
IEEE COMMUNICATIONS MAGAZINE, 2003, 41 (07) :142-153
[6]   IP traceback with deterministic packet marking [J].
Belenky, A ;
Ansari, N .
IEEE COMMUNICATIONS LETTERS, 2003, 7 (04) :162-164
[7]  
Belenky A., 2007, INT J COMPUTER TELEC, V51, P2677
[8]  
BELLOVIN S, 2000, ICMP TRACEB IN PRESS
[9]  
Dean D., 2002, ACM Transactions on Information and Systems Security, V5, P119, DOI 10.1145/505586.505588
[10]   A practical and robust inter-domain marking scheme for IP traceback [J].
Gao, Zhiqiang ;
Ansari, Nirwan .
COMPUTER NETWORKS, 2007, 51 (03) :732-750