A Lightweight IP Traceback Scheme Depending on TTL

被引:6
|
作者
Yan Fen [1 ]
Zhu Hui [1 ]
Chen Shuang-shuang [1 ]
Yin Xin-chun [1 ]
机构
[1] Yangzhou Univ, Informat & Engn Coll, Yangzhou 225009, Peoples R China
关键词
DDoS attack; reconstruction; IP traceback;
D O I
10.1016/j.proeng.2012.01.239
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
This article proposes a new type of IP traceback scheme, through recording TTL of the IP header to get the attack path, when the algorithm is in processing, you do not need to generate additional packages, so attackers could not detect the trackback happened, the scheme can be applied in at any strength of DDoS attack, solves the problem of traditional PPM algorithm failed in high strength DDoS attack, also improves the efficiency of traceback, compare with the other scheme, this scheme is simple, efficiency and robustness. So this scheme can effectively resolve the reconstruction problem. (c) 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of Harbin University of Science and Technology
引用
收藏
页码:1932 / 1937
页数:6
相关论文
共 50 条
  • [31] IP traceback marking scheme based packets filtering mechanism
    Ping, SY
    Lee, MC
    2004 IEEE Workshop on IP Operations and Management Proceedings (IPOM 2004): SELF-MEASUREMENT & SELF-MANAGEMENT OF IP NETWORKS & SERVICES, 2004, : 253 - 260
  • [32] A hybrid scheme using packet marking and logging for IP traceback
    Malliga, S.
    Tamilarasi, A.
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2010, 5 (1-2) : 81 - 91
  • [33] A Probabilistic Packet Marking Scheme with LT Code for IP Traceback
    Lin, I-Long
    Peng, Shih-Hao
    JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (02): : 189 - 202
  • [34] A proposal for new marking scheme with its performance evaluation for IP traceback
    Malliga, S.
    Tamilarasi, A.
    WSEAS Transactions on Computer Research, 2008, 3 (04): : 259 - 272
  • [35] Illegal Packet Tracing And Track Hackers Using Ip Traceback Scheme
    Shala, K. S.
    Shenbagamoorthy, G.
    2013 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET), 2013, : 311 - 314
  • [36] A fast search and advanced marking scheme for network IP traceback model
    Hou, J
    Lee, MH
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2005, 3816 : 15 - 20
  • [37] An Investigation about the Simulation of IP Traceback and Various IP Traceback Strategies
    Karthik, S.
    Arunachalam, V. P.
    Ravichandran, T.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (12): : 240 - 245
  • [38] A practical and robust inter-domain marking scheme for IP traceback
    Gao, Zhiqiang
    Ansari, Nirwan
    COMPUTER NETWORKS, 2007, 51 (03) : 732 - 750
  • [39] Autonomous System based Flow Marking Scheme for IP-Traceback
    Aghaei-Foroushani, Vahid
    Zincir-Heywood, A. Nur
    NOMS 2016 - 2016 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2016, : 121 - 128
  • [40] A Secure Packet Marking Scheme for IP Traceback in IPv6
    Tripathy, Animesh
    Dansana, Jayanti
    Mishra, Debi Prasad
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 656 - 659