Low Storage and Traceback Overhead IP Traceback System

被引:0
|
作者
Malliga, S. [1 ]
Selvi, C. S. Kanimozhi [1 ]
Kogilavani, S. V. [1 ]
机构
[1] Kongu Engn Coll, Dept Comp Sci & Engn, Perundurai 638052, Tamil Nadu, India
关键词
IP spoofing; DoS; IP traceback; packet marking; packet logging; logging overhead; traceback accuracy; PACKET MARKING;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Using IP spoofing, a person masquerades as another by falsifying source IP address and gains an illegitimate access. Denial of Service (DoS) is an attack that is launched to bring down a network by flooding it with useless traffic. This attack can be easily exploited by IP spoofing. To prevent DoS, it is necessary to determine the source of the attacks. IP traceback is a mechanism that attempts to reconstruct the path traversed by a packet to find the real source. Two predominant traceback mechanisms are packet marking and logging. Packet marking records the path information of the intermediate routers in the packet, which can then be used to reconstruct the path. Packet logging logs the packets at the intermediate routers. Hybridizing these two methods gives the benefits of both. This paper refines a hybrid IP traceback method, Modulo and Reverse modulo and proposes a few changes in the way the packets are logged and tracked back. Revised-MORE uses subnet address to create hash values rather than source IP. This reduces the amount of packets to be logged at the routers. Time-To-Live is used for tracing exactly. The simulation results show that the refinements reduce logging overhead, storage requirements and improve traceback accuracy.
引用
收藏
页码:27 / 45
页数:19
相关论文
共 50 条
  • [31] An Efficient and Adaptive IP Traceback Scheme
    Iwamoto, Kayoko
    Soshi, Masakazu
    Satoh, Takashi
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED COMPUTING AND APPLICATIONS (SOCA), 2014, : 235 - 240
  • [32] Ant-based IP traceback
    Lai, Gu Hsin
    Chen, Chia-Mei
    Jeng, Bing-Chiang
    Chao, Willanis
    EXPERT SYSTEMS WITH APPLICATIONS, 2008, 34 (04) : 3071 - 3080
  • [33] IP traceback using header compression
    Aljifri, H
    Smets, M
    Pons, A
    COMPUTERS & SECURITY, 2003, 22 (02) : 136 - 151
  • [34] IP Traceback in Star Colored Networks
    Roy, Sangita
    Singh, Anurag
    Sairam, Ashok Singh
    2013 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2013,
  • [35] A Survey of Modern IP Traceback Methodologies
    Balyk, Anatolii
    Iatsykovska, Uliana
    Karpinski, Mikolaj
    Khokhlachova, Yuliia
    Shaikhanova, Aigul
    Korkishko, Lesia
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOLS 1-2, 2015, : 484 - 488
  • [36] Identifying the Attack Source by IP Traceback
    Nalavade, K. C.
    Meshram, B. B.
    INFORMATION AND COMMUNICATION TECHNOLOGIES, 2010, 101 : 292 - 296
  • [37] Evaluating the Partial Deployment of an AS-level IP Traceback System
    Castelucio, Andre O.
    Salles, Ronaldo M.
    Ziviani, Artur
    APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 2069 - +
  • [38] Design of IP Traceback System based on Generalized Bloom Filter
    Chen, Zhouguo
    Liu, Bo
    Pu, Shi
    Huang, Chen
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SERVICE SYSTEM (CSSS), 2014, 109 : 451 - 456
  • [39] Efficient technique for fast IP traceback
    Kim, Byungryong
    COOPERATIVE DESIGN, VISUALIZATION, AND ENGINEERING, PROCEEDINGS, 2006, 4101 : 211 - 218
  • [40] Single-packet IP traceback
    Snoeren, AC
    Partridge, C
    Sanchez, LA
    Jones, CE
    Tchakountio, F
    Schwartz, B
    Kent, ST
    Strayer, WT
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2002, 10 (06) : 721 - 734