A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking

被引:36
作者
Yu, Shui [1 ]
Zhou, Wanlei [1 ]
Guo, Song [2 ]
Guo, Minyi [3 ]
机构
[1] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3125, Australia
[2] Univ Aizu, Sch Comp Sci & Engn, Aizu Wakamatsu, Fukushima, Japan
[3] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
基金
中国国家自然科学基金;
关键词
Cybersecurity; IP traceback; packet marking; scalability; MIMICKING ATTACKS;
D O I
10.1109/TC.2015.2439287
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
DDoS attack source traceback is an open and challenging problem. Deterministic packet marking (DPM) is a simple and effective traceback mechanism, but the current DPM based traceback schemes are not practical due to their scalability constraint. We noticed a factor that only a limited number of computers and routers are involved in an attack session. Therefore, we only need to mark these involved nodes for traceback purpose, rather than marking every node of the Internet as the existing schemes doing. Based on this finding, we propose a novel marking on demand (MOD) traceback scheme based on the DPM mechanism. In order to traceback to involved attack source, what we need to do is to mark these involved ingress routers using the traditional DPM strategy. Similar to existing schemes, we require participated routers to install a traffic monitor. When a monitor notices a surge of suspicious network flows, it will request a unique mark from a globally shared MOD server, and mark the suspicious flows with the unique marks. At the same time, the MOD server records the information of the marks and their related requesting IP addresses. Once a DDoS attack is confirmed, the victim can obtain the attack sources by requesting the MOD server with the marks extracted from attack packets. Moreover, we use the marking space in a round-robin style, which essentially addresses the scalability problem of the existing DPM based traceback schemes. We establish a mathematical model for the proposed traceback scheme, and thoroughly analyze the system. Theoretical analysis and extensive real-world data experiments demonstrate that the proposed traceback method is feasible and effective.
引用
收藏
页码:1418 / 1427
页数:10
相关论文
共 33 条
  • [1] Novel hybrid schemes employing packet marking and logging for IP traceback
    Al-Duwairi, B
    Govindarasu, M
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2006, 17 (05) : 403 - 418
  • [2] [Anonymous], 2003, Internet mathematics, DOI [10.1080/15427951.2004.10129088, DOI 10.1080/15427951.2004.10129088]
  • [3] A Survey of Botnet Technology and Defenses
    Bailey, Michael
    Cooke, Evan
    Jahanian, Farnam
    Xu, Yunjing
    Karir, Manish
    [J]. CATCH 2009: CYBERSECURITY APPLICATIONS AND TECHNOLOGY CONFERENCE FOR HOMELAND SECURITY, PROCEEDINGS, 2009, : 299 - +
  • [4] IP traceback with deterministic packet marking
    Belenky, A
    Ansari, N
    [J]. IEEE COMMUNICATIONS LETTERS, 2003, 7 (04) : 162 - 164
  • [5] On deterministic packet marking
    Belenky, Andrey
    Ansari, Nirwan
    [J]. COMPUTER NETWORKS, 2007, 51 (10) : 2677 - 2700
  • [6] A divide-and-conquer strategy for thwarting distributed denial-of-service attacks
    Chen, Ruiliang
    Park, Jung-Min
    Marchany, Randolph
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2007, 18 (05) : 577 - 588
  • [7] An Information-Theoretic View of Network-Aware Malware Attacks
    Chen, Zesheng
    Ji, Chuanyi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (03) : 530 - 541
  • [8] Probabilistic packet marking for large-scale IP traceback
    Goodrich, Michael T.
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2008, 16 (01) : 15 - 24
  • [9] Ianelli N., 2007, INT J FORENSIC COMPU, P19, DOI 10.5769/j200701002
  • [10] Blind Detection of Spread Spectrum Flow Watermarks
    Jia, Weijia
    Tso, Fung Po
    Ling, Zhen
    Fu, Xinwen
    Xuan, Dong
    Yu, Wei
    [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 2195 - +