IP Traceback based on Deterministic Packet Marking and Logging

被引:0
|
作者
Wang Xiao-jing [1 ,2 ]
Xiao You-lin [3 ]
机构
[1] Beijing Inst Technol, Lab Comp Network Def Technol, Beijing 100081, Peoples R China
[2] Xain Polit Inst, Xian, Peoples R China
[3] Beijing Mil Representat, Gen Armament Dept, Beijing, Peoples R China
关键词
network security; distributed denial of service (DDoS); IP traceback; deterministic packet marking (DPM); packet logging;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
IP traceback mechanisms are a critical part of the defense against IP spoofing and DoS attacks. Currently proposed traceback mechanisms are inadequate to address the traceback problem for the following reasons: they lack incentives for ISPs to deploy IP traceback in their networks; they do not scale to large scale distributed DoS attacks. In this paper, a novel IP traceback approach based on packet logging and deterministic packet marking (LDPM) is proposed, that significantly improves IP traceback in several aspects: (1) LDPM is built on a distributed hierarchical IP traceback system, and is simple to deploy. (2) LDPM uses a new IP header encoding scheme to store the complete identification information of a router into a single packet, thus it can protect the privacy of network topology and victims can identify attack ingress router with one packet. It also can cope with large distributed attacks with thousands of attackers. (3) LDPM can manipulate the marking information at the edge ingress routers. Therefore, as a value-added services, ISPs can provide traceback business to their customers. Compared with previous traceback schemes, LDPM improves the performance and practicability of IF traceback.
引用
收藏
页码:178 / +
页数:2
相关论文
共 50 条
  • [1] IP traceback based on packet marking and logging
    Gong, C
    Sarac, K
    ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 1043 - 1047
  • [2] IP traceback with deterministic packet marking
    Belenky, A
    Ansari, N
    IEEE COMMUNICATIONS LETTERS, 2003, 7 (04) : 162 - 164
  • [3] Deterministic packet marking based on redundant decomposition for IP traceback
    Jin, Guang
    Yang, Jiangang
    IEEE COMMUNICATIONS LETTERS, 2006, 10 (03) : 204 - 206
  • [4] A Precise and Practical IP Traceback Technique Based on Packet Marking and Logging
    Yan, Dong
    Wang, Yulong
    Su, Sen
    Yang, Fangchun
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2012, 28 (03) : 453 - 470
  • [5] A Novel Deterministic Packet Marking Scheme for IP Traceback
    Qu Zhaoyang
    Huang Chunfeng
    2008 WORKSHOP ON POWER ELECTRONICS AND INTELLIGENT TRANSPORTATION SYSTEM, PROCEEDINGS, 2008, : 38 - 41
  • [6] A Fast Deterministic Packet Marking Scheme for IP Traceback
    Wang Xiao-jing
    Hu Chang-zhen
    Hu He
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 526 - 529
  • [7] Enhanced and authenticated deterministic packet marking for IP traceback
    Peng, Dan
    Shi, Zhicai
    Tao, Longming
    Ma, Wu
    ADVANCED PARALLEL PROCESSING TECHNOLOGIES, PROCEEDINGS, 2007, 4847 : 508 - 517
  • [8] Accommodating fragmentation in deterministic packet marking for IP traceback
    Belenky, A
    Ansari, N
    GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1374 - 1378
  • [9] Deterministic Packet Marking with Link Signatures for IP traceback
    Shi Yi
    Yang Xinyu
    Li Ning
    Qi Yong
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 144 - +
  • [10] DDPM:Dynamic deterministic packet marking for IP traceback
    Shokri, Reza
    Varshovi, Ali
    Mohammadi, Hossein
    Yazdani, Nasser
    Sadeghian, Babak
    ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 312 - +