A practical and robust inter-domain marking scheme for IP traceback

被引:32
作者
Gao, Zhiqiang [1 ]
Ansari, Nirwan [1 ]
机构
[1] New Jersey Inst Technol, Dept Elect & Comp Engn, Adv Networking Lab, Newark, NJ 07102 USA
关键词
distributed denial of service (DDoS); Probabilistic Packet Marking (PPM); IP traceback; network security;
D O I
10.1016/j.comnet.2006.06.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A practical and robust inter-domain marking scheme for IP traceback is proposed. We first identify six drawbacks of Probabilistic Packet Marking (PPM), and then contrive a synergic scheme to address all of them. To relieve the victim from the daunting computational overhead, we derive the optimal marking probability with respect to the number of packets required for path reconstruction, and explore two different approaches to enhance PPM. In so doing, computational burden and spoofed marking inscribed by the attacker are thwarted. Next, we study the issue of bogus marking incurred by subverted routers. By coupling the marking and routing information, a downstream router can examine the correctness of the marking provided by upstream routers, thus eliminating the spurious marking embedded by subverted routers. Our coarse-grained marking tactic (marking at the AS level rather than hop-by-hop) brings two additional benefits: our scheme can effectively suppress false positives, and partial deployment of our scheme may achieve the similar effect as global deployment in the power-law Internet. Finally, we evaluate and analyze the performance of our proposal on empirical Internet measurement data. Results show that as many as 90.67% of marked packets required for path reconstruction may be reduced on average while false positives are greatly suppressed and robustness is significantly enhanced. (c) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:732 / 750
页数:19
相关论文
共 47 条
[1]  
ADLER M, 2002, ANN ACM S THEOR COMP, P407
[2]   IP traceback using header compression [J].
Aljifri, H ;
Smets, M ;
Pons, A .
COMPUTERS & SECURITY, 2003, 22 (02) :136-151
[3]   Jikzi - a new framework for security policy, trusted publishing and electronic commerce [J].
Anderson, R ;
Lee, JH .
COMPUTER COMMUNICATIONS, 2000, 23 (17) :1621-1626
[4]  
[Anonymous], 1995, 1771 RFC
[5]  
[Anonymous], P IEEE WORKSH INF AS
[6]  
Belenky A, 2003, 2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, P49
[7]   On IP traceback [J].
Belenky, A ;
Ansari, N .
IEEE COMMUNICATIONS MAGAZINE, 2003, 41 (07) :142-153
[8]   IP traceback with deterministic packet marking [J].
Belenky, A ;
Ansari, N .
IEEE COMMUNICATIONS LETTERS, 2003, 7 (04) :162-164
[9]  
BELLOVIN SM, 2000, IN PRESS ICMP TRACEB
[10]  
Burch H, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE FOURTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIV), P319