A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking

被引:37
作者
Yu, Shui [1 ]
Zhou, Wanlei [1 ]
Guo, Song [2 ]
Guo, Minyi [3 ]
机构
[1] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3125, Australia
[2] Univ Aizu, Sch Comp Sci & Engn, Aizu Wakamatsu, Fukushima, Japan
[3] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
基金
中国国家自然科学基金;
关键词
Cybersecurity; IP traceback; packet marking; scalability; MIMICKING ATTACKS;
D O I
10.1109/TC.2015.2439287
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
DDoS attack source traceback is an open and challenging problem. Deterministic packet marking (DPM) is a simple and effective traceback mechanism, but the current DPM based traceback schemes are not practical due to their scalability constraint. We noticed a factor that only a limited number of computers and routers are involved in an attack session. Therefore, we only need to mark these involved nodes for traceback purpose, rather than marking every node of the Internet as the existing schemes doing. Based on this finding, we propose a novel marking on demand (MOD) traceback scheme based on the DPM mechanism. In order to traceback to involved attack source, what we need to do is to mark these involved ingress routers using the traditional DPM strategy. Similar to existing schemes, we require participated routers to install a traffic monitor. When a monitor notices a surge of suspicious network flows, it will request a unique mark from a globally shared MOD server, and mark the suspicious flows with the unique marks. At the same time, the MOD server records the information of the marks and their related requesting IP addresses. Once a DDoS attack is confirmed, the victim can obtain the attack sources by requesting the MOD server with the marks extracted from attack packets. Moreover, we use the marking space in a round-robin style, which essentially addresses the scalability problem of the existing DPM based traceback schemes. We establish a mathematical model for the proposed traceback scheme, and thoroughly analyze the system. Theoretical analysis and extensive real-world data experiments demonstrate that the proposed traceback method is feasible and effective.
引用
收藏
页码:1418 / 1427
页数:10
相关论文
共 33 条
[21]   An Advanced Hybrid Peer-to-Peer Botnet [J].
Wang, Ping ;
Sparks, Sherri ;
Zou, Cliff C. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2010, 7 (02) :113-127
[22]   Network flow watermarking attack on low-latency anonymous communication systems [J].
Wang, Xinyuan ;
Chen, Shiping ;
Jajodia, Sushil .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :116-+
[23]   Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks [J].
Xiang, Yang ;
Zhou, Wanlei ;
Guo, Minyi .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2009, 20 (04) :567-580
[24]  
Yaar A, 2005, IEEE INFOCOM SER, P1395
[25]  
Yu S., 2014, DISTRIBUTED DENIAL S
[26]   InfOrmation theory based detection against network behavior mimicking DDoS attacks [J].
Yu, Shui ;
Zhou, Wanlei ;
Doss, Robin .
IEEE COMMUNICATIONS LETTERS, 2008, 12 (04) :319-321
[27]  
Yu S, 2013, IEEE GLOB COMM CONF, P729, DOI 10.1109/GLOCOM.2013.6831159
[28]   Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace [J].
Yu, Shui ;
Guo, Song ;
Stojmenovic, Ivan .
IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (01) :139-151
[29]   Malware Propagation in Large-Scale Networks [J].
Yu, Shui ;
Gu, Guofei ;
Barnawi, Ahmed ;
Guo, Song ;
Stojmenovic, Ivan .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2015, 27 (01) :170-179
[30]   Can We Beat DDoS Attacks in Clouds? [J].
Yu, Shui ;
Tian, Yonghong ;
Guo, Song ;
Wu, Dapeng Oliver .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (09) :2245-2254