HPSIPT: A high-precision single-packet IP traceback scheme

被引:10
作者
Murugesan, Vijayalakshmi [1 ]
Selvaraj, Mercy Shalinie [1 ]
Yang, Ming-Hour [2 ]
机构
[1] Thiagarajar Coll Engn, Dept Comp Sci & Engn, Madurai 15, Tamil Nadu, India
[2] Chung Yuan Christian Univ, Informat & Comp Engn, 200 Chung Pei Rd, Chungli 32023, Taiwan
关键词
IP; IP spoofing; IP traceback; Denial of service/distributed denial of service attack; Packet logging; Packet marking; MARKING;
D O I
10.1016/j.comnet.2018.07.013
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) attack remains a major threat, even in the era of connected devices. Attackers often hide their identity, making defending or identifying and subsequently prosecuting them difficult. In this paper, we propose a novel high-precision single-packet IP traceback (HPSIPT) scheme that facilitates the trace back of each spoofed packet to its origin. Numerous IP trace back techniques for tracing attackers exist; however, they are limited either by the number of packets required or the storage and computational overheads incurred at the routers. By contrast, the proposed technique incurs negligible storage and computational overheads. Simulation results based on real-world Internet topologies (obtained from CAIDA) reveal that the proposed IP traceback scheme has a precision of 0.9751, accuracy of 0.9053, recall of 0.8580 and an F1 score of 0.9128 when tracing 130,000 attackers. The implementation of the proposed scheme requires less than 10KB of storage in most routers, which is approximately 32 times less than that required by other state-of-the-art single-packet traceback techniques. The efficacy of the proposed scheme is compared with that of other single-packet traceback schemes in terms of computational time, storage, accuracy, precision, recall and F1 score. Statistical tests are performed to support the statistical significance of the obtained results. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:275 / 288
页数:14
相关论文
共 50 条
[1]   Novel hybrid schemes employing packet marking and logging for IP traceback [J].
Al-Duwairi, B ;
Govindarasu, M .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2006, 17 (05) :403-418
[2]   Catabolism attack and Anabolism defense: A novel attack and traceback mechanism in Opportunistic Networks [J].
Alajeely, Majeed ;
Doss, Robin ;
Ahmad, Asma'a ;
Mak-Hau, Vicky .
COMPUTER COMMUNICATIONS, 2015, 71 :111-118
[3]  
[Anonymous], 2012, TECH REP
[4]  
[Anonymous], 2011, The Network Simulator - ns-3
[5]  
[Anonymous], P IMC 07 7 ACM SIGCO
[6]  
[Anonymous], NEUST DDOS ATT PROT
[7]  
[Anonymous], STOP 0A TCPIP SYS RE
[8]  
[Anonymous], STAT INT SEC Q2 2017
[9]  
[Anonymous], P USENIX SEC S LISA
[10]  
[Anonymous], P IEEE LOC COMP NETW