Low Storage and Traceback Overhead IP Traceback System

被引:0
|
作者
Malliga, S. [1 ]
Selvi, C. S. Kanimozhi [1 ]
Kogilavani, S. V. [1 ]
机构
[1] Kongu Engn Coll, Dept Comp Sci & Engn, Perundurai 638052, Tamil Nadu, India
关键词
IP spoofing; DoS; IP traceback; packet marking; packet logging; logging overhead; traceback accuracy; PACKET MARKING;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Using IP spoofing, a person masquerades as another by falsifying source IP address and gains an illegitimate access. Denial of Service (DoS) is an attack that is launched to bring down a network by flooding it with useless traffic. This attack can be easily exploited by IP spoofing. To prevent DoS, it is necessary to determine the source of the attacks. IP traceback is a mechanism that attempts to reconstruct the path traversed by a packet to find the real source. Two predominant traceback mechanisms are packet marking and logging. Packet marking records the path information of the intermediate routers in the packet, which can then be used to reconstruct the path. Packet logging logs the packets at the intermediate routers. Hybridizing these two methods gives the benefits of both. This paper refines a hybrid IP traceback method, Modulo and Reverse modulo and proposes a few changes in the way the packets are logged and tracked back. Revised-MORE uses subnet address to create hash values rather than source IP. This reduces the amount of packets to be logged at the routers. Time-To-Live is used for tracing exactly. The simulation results show that the refinements reduce logging overhead, storage requirements and improve traceback accuracy.
引用
收藏
页码:27 / 45
页数:19
相关论文
共 50 条
  • [21] Bee-Based IP Traceback
    Hamedi-Hamzehkolaie, M.
    Chen, Chi
    Tian, Xue
    Sanei, Reza
    Nezhad, Masoud Khalil
    2014 11TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2014, : 968 - 972
  • [22] New algorithm NA for IP traceback
    Xia, Chun-He
    Shi, Yun-Ping
    Zhao, Qin-Ping
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2004, 41 (04): : 689 - 696
  • [23] The Systematic Survey for IP Traceback Methods
    Tian, Hongcheng
    Bi, Jun
    2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 906 - 911
  • [24] Opportunistic Piggyback Marking for IP Traceback
    Cheng, Long
    Divakaran, Dinil Mon
    Lim, Wee Yong
    Thing, Vrizlynn L. L.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) : 273 - 288
  • [25] IP Traceback Schemes for DDoS Attack
    Mandhar, Vipul
    Ranga, Virender
    NETWORKING COMMUNICATION AND DATA KNOWLEDGE ENGINEERING, VOL 1, 2018, 3 : 37 - 50
  • [26] IP traceback techniques for intrusion tracking
    Nur, MM
    Syed, MR
    Bignall, RJ
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 384 - 388
  • [27] Vulnerability analysis of IP traceback schemes
    Cai, L
    Pan, JP
    Shen, SX
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1806 - 1810
  • [28] An implementation of a hierarchical IP traceback architecture
    Oe, M
    Kadobayashi, Y
    Yamaguchi, S
    2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, : 250 - 253
  • [29] A Prediction Based Approach to IP Traceback
    Kiremire, Ankunda R.
    Brust, Matthias R.
    Phoha, Vir V.
    PROCEEDINGS OF THE 37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN 2012), 2012, : 1022 - 1029
  • [30] A packet marking scheme for IP traceback
    Qu, HP
    Su, PR
    Lin, DD
    Feng, DG
    NETWORKING - ICN 2005, PT 2, 2005, 3421 : 964 - 971