Low Storage and Traceback Overhead IP Traceback System

被引:0
|
作者
Malliga, S. [1 ]
Selvi, C. S. Kanimozhi [1 ]
Kogilavani, S. V. [1 ]
机构
[1] Kongu Engn Coll, Dept Comp Sci & Engn, Perundurai 638052, Tamil Nadu, India
关键词
IP spoofing; DoS; IP traceback; packet marking; packet logging; logging overhead; traceback accuracy; PACKET MARKING;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Using IP spoofing, a person masquerades as another by falsifying source IP address and gains an illegitimate access. Denial of Service (DoS) is an attack that is launched to bring down a network by flooding it with useless traffic. This attack can be easily exploited by IP spoofing. To prevent DoS, it is necessary to determine the source of the attacks. IP traceback is a mechanism that attempts to reconstruct the path traversed by a packet to find the real source. Two predominant traceback mechanisms are packet marking and logging. Packet marking records the path information of the intermediate routers in the packet, which can then be used to reconstruct the path. Packet logging logs the packets at the intermediate routers. Hybridizing these two methods gives the benefits of both. This paper refines a hybrid IP traceback method, Modulo and Reverse modulo and proposes a few changes in the way the packets are logged and tracked back. Revised-MORE uses subnet address to create hash values rather than source IP. This reduces the amount of packets to be logged at the routers. Time-To-Live is used for tracing exactly. The simulation results show that the refinements reduce logging overhead, storage requirements and improve traceback accuracy.
引用
收藏
页码:27 / 45
页数:19
相关论文
共 50 条
  • [41] Hash-based IP traceback
    Snoeren, AC
    Partridge, C
    Sanchez, LA
    Jones, CE
    Tchakountio, F
    Kent, ST
    Strayer, WT
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2001, 31 (04) : 3 - 14
  • [42] An evaluation of different IP traceback approaches
    Kuznetsov, V
    Sandström, H
    Simkin, A
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 37 - 48
  • [43] IP traceback with deterministic packet marking
    Belenky, A
    Ansari, N
    IEEE COMMUNICATIONS LETTERS, 2003, 7 (04) : 162 - 164
  • [44] A novel approach based on ant colony system for IP traceback
    Liu, Menglin
    Jin, Zhengping
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND ENGINEERING APPLICATIONS, 2016, 63 : 358 - 363
  • [45] An adaptive edge marking based hierarchical IP traceback system
    Jing, YN
    Li, JT
    Zhang, GD
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1188 - 1197
  • [46] Adaptive IP Traceback Mechanism for Detecting Low Rate DDoS Attacks
    Baskar, M.
    Gnanasekaran, T.
    Saravanan, S.
    2013 IEEE INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN COMPUTING, COMMUNICATION AND NANOTECHNOLOGY (ICE-CCN'13), 2013, : 373 - 377
  • [47] Advanced and authenticated marking schemes for IP traceback
    Song, DXD
    Perrig, A
    IEEE INFOCOM 2001: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: TWENTY YEARS INTO THE COMMUNICATIONS ODYSSEY, 2001, : 878 - 886
  • [48] RIHT: A Novel Hybrid IP Traceback Scheme
    Yang, Ming-Hour
    Yang, Ming-Chien
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 789 - 797
  • [49] IP traceback algorithm for DoS/DDoS attack
    Yim, Hong-bin
    Jung, Jae-il
    MANAGEMENT OF CONVERGENCE NETWORKS AND SERVICES, PROCEEDINGS, 2006, 4238 : 558 - 561
  • [50] An IP traceback scheme integrating DPM and PPM
    Min, F
    Zhang, JY
    Yang, GW
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 76 - 85