Low Storage and Traceback Overhead IP Traceback System

被引:0
|
作者
Malliga, S. [1 ]
Selvi, C. S. Kanimozhi [1 ]
Kogilavani, S. V. [1 ]
机构
[1] Kongu Engn Coll, Dept Comp Sci & Engn, Perundurai 638052, Tamil Nadu, India
关键词
IP spoofing; DoS; IP traceback; packet marking; packet logging; logging overhead; traceback accuracy; PACKET MARKING;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Using IP spoofing, a person masquerades as another by falsifying source IP address and gains an illegitimate access. Denial of Service (DoS) is an attack that is launched to bring down a network by flooding it with useless traffic. This attack can be easily exploited by IP spoofing. To prevent DoS, it is necessary to determine the source of the attacks. IP traceback is a mechanism that attempts to reconstruct the path traversed by a packet to find the real source. Two predominant traceback mechanisms are packet marking and logging. Packet marking records the path information of the intermediate routers in the packet, which can then be used to reconstruct the path. Packet logging logs the packets at the intermediate routers. Hybridizing these two methods gives the benefits of both. This paper refines a hybrid IP traceback method, Modulo and Reverse modulo and proposes a few changes in the way the packets are logged and tracked back. Revised-MORE uses subnet address to create hash values rather than source IP. This reduces the amount of packets to be logged at the routers. Time-To-Live is used for tracing exactly. The simulation results show that the refinements reduce logging overhead, storage requirements and improve traceback accuracy.
引用
收藏
页码:27 / 45
页数:19
相关论文
共 50 条
  • [1] High Accuracy and Low Storage Hybrid IP Traceback
    Yang, Ming Hour
    Luo, Jia-Ning
    Yang, Ming Chien
    Hsu, Wei Chun
    2014 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (CITS), 2014,
  • [2] On IP traceback
    Belenky, A
    Ansari, N
    IEEE COMMUNICATIONS MAGAZINE, 2003, 41 (07) : 142 - 153
  • [3] STUDY ON IP TRACEBACK SYSTEM FOR DDoS
    Chae, Cheol-Joo
    Kim, Bong-Han
    Lee, Jae-Kwang
    ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL ISAS-1: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, VOL 1, 2008, : 279 - +
  • [4] An Investigation about the Simulation of IP Traceback and Various IP Traceback Strategies
    Karthik, S.
    Arunachalam, V. P.
    Ravichandran, T.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (12): : 240 - 245
  • [5] IP Traceback In GPRS
    Bai, Qingchang
    Qi, Feng
    PROCEEDINGS OF 2011 INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENCE AND AWARENESS INTERNET, IET AIAI2011, 2011, : 283 - 287
  • [6] Taxonomy of IP Traceback
    Santhanam, Lakshmi
    Kumar, Anup
    Agrawal, Dharma P.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (01): : 79 - 93
  • [7] The Survey for IP Traceback
    Tian, Hongcheng
    Lin, Jinan
    MECHANICAL COMPONENTS AND CONTROL ENGINEERING III, 2014, 668-669 : 1339 - 1342
  • [8] ICMP traceback with cumulative path, an efficient solution for IP traceback
    Lee, HCJ
    Thing, VLL
    Xu, Y
    Ma, M
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 124 - 135
  • [9] Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy
    Yang, Ming Hour
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [10] Design and Analysis of a Hierarchical IP Traceback System
    Dabir, Abes
    Matrawy, Ashraf
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 971 - 976