IP Traceback based on Deterministic Packet Marking and Logging

被引:0
作者
Wang Xiao-jing [1 ,2 ]
Xiao You-lin [3 ]
机构
[1] Beijing Inst Technol, Lab Comp Network Def Technol, Beijing 100081, Peoples R China
[2] Xain Polit Inst, Xian, Peoples R China
[3] Beijing Mil Representat, Gen Armament Dept, Beijing, Peoples R China
来源
2009 INTERNATIONAL CONFERENCE ON SCALABLE COMPUTING AND COMMUNICATIONS & EIGHTH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING | 2009年
关键词
network security; distributed denial of service (DDoS); IP traceback; deterministic packet marking (DPM); packet logging;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
IP traceback mechanisms are a critical part of the defense against IP spoofing and DoS attacks. Currently proposed traceback mechanisms are inadequate to address the traceback problem for the following reasons: they lack incentives for ISPs to deploy IP traceback in their networks; they do not scale to large scale distributed DoS attacks. In this paper, a novel IP traceback approach based on packet logging and deterministic packet marking (LDPM) is proposed, that significantly improves IP traceback in several aspects: (1) LDPM is built on a distributed hierarchical IP traceback system, and is simple to deploy. (2) LDPM uses a new IP header encoding scheme to store the complete identification information of a router into a single packet, thus it can protect the privacy of network topology and victims can identify attack ingress router with one packet. It also can cope with large distributed attacks with thousands of attackers. (3) LDPM can manipulate the marking information at the edge ingress routers. Therefore, as a value-added services, ISPs can provide traceback business to their customers. Compared with previous traceback schemes, LDPM improves the performance and practicability of IF traceback.
引用
收藏
页码:178 / +
页数:2
相关论文
共 23 条
  • [1] Trade-offs in probabilistic packet marking for IP traceback
    Adler, M
    [J]. JOURNAL OF THE ACM, 2005, 52 (02) : 217 - 244
  • [2] [Anonymous], 1968, An introduction to probability theory and its applications
  • [3] Belenky A, 2003, 2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, P49
  • [4] IP traceback with deterministic packet marking
    Belenky, A
    Ansari, N
    [J]. IEEE COMMUNICATIONS LETTERS, 2003, 7 (04) : 162 - 164
  • [5] Dean D., 2002, ACM Transactions on Information and Systems Security, V5, P119, DOI 10.1145/505586.505588
  • [6] DURRESI A, 2008, J NETWORK C IN PRESS
  • [7] A practical and robust inter-domain marking scheme for IP traceback
    Gao, Zhiqiang
    Ansari, Nirwan
    [J]. COMPUTER NETWORKS, 2007, 51 (03) : 732 - 750
  • [8] Tracing cyber attacks from the practical perspective
    Gao, ZQ
    Ansari, N
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2005, 43 (05) : 123 - 131
  • [9] Gong C., 2009, INT J NETW SECURITY, V8, P271
  • [10] JIN G, 2007, 2 INT C COMM NETW CH, V2, P353