Implementing IP Traceback in the Internet — An ISP Perspective

نویسندگان

  • Dong Wei
  • Nirwan Ansari
چکیده

ISBN 0-7803-9850-5 /$10.00  2002 IEEE Page 326 Abstract--Denial-of-Service (DoS) attacks consume the resources of remote hosts and the network in terms of buffers, processing power, and connections, thus denying or degrading the Internet services to legitimate users. Managed security service (MSS) has been developed to provide better network performance in addition to protect customers from being attacked. IP traceback is one of the most important features incorporated in MSS. Probabilistic packet marking, a promising IP traceback scheme, has received much attention in the past couple of years, owing to its desirable properties. In this paper, we discuss the implementation issues of IP traceback technology from an ISP perspective. We introduce a practical marking scheme, in which the marking edge is a label representing a router instead of the router’s IP address, and the marking probability is a function of the distance of the first trusted router on the attack path. To deal with spoofed marking, we also propose a hash-based scheme to validate the information in the marking field.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tracing Multiple Attackers with Deterministic Packet Marking (DPM)

The rising threat of cyber attacks, especially distributed denial-of-service (DDoS), makes the IP Traceback problem very relevant to today’s Internet security. IP Traceback is one of the security problems associated with identifying the source of the attack packets. This work presents a novel approach to IP Traceback Deterministic Packet Marking (DPM). The proposed approach is scalable, simple ...

متن کامل

Traceback of Ddos Attacks Using Entropy Variations

Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet which deny normal service and degrade quality of service. However, the Network security mechanisms does not have effective and efficient methods to trace back the source of these attacks. In this paper, I propose a novel traceback method for DDoS attacks that is based on entropy variations between normal and DDoS...

متن کامل

Tracing the True Source of an IPv6 Datagram Using Policy Based Management System

In any (D)DoS attack, invaders may use incorrect or spoofed IP addresses in the attacking packets and thus disguise the factual origin of the attacks. Due to the stateless nature of the internet, it is an intricate problem to determine the source of these spoofed IP packets. This is where; we need the IP traceback mechanism i.e. identifying the true source of an IP datagram in internet. While m...

متن کامل

An Investigation of 2n Direction Geographical Traceback Using Direction Ratio Sampling Algorithm (DRSA) & IP Traceback Strategies

DoS / DDoS(Distributed Denial of Service) attacks deny regular, internet services accessed by legitimate users, either by blocking the services completely, or by disturbing it completely, so as to cause customer baulking. Several traceback schemes are available to mitigate these attacks. The simulation approach also can be used to test the performing effects of different marking schemes in larg...

متن کامل

Design & Implementation of Hybrid Ip Traceback Involving Path Reconstruction Using Qos

Ease of access to internet in this present situation has increased the threats to the security of the network. Illegitimate user’s causes damage to the resources, thereby hindering the service rendered to the users. Defending against Denial of Service (DoS) attacks requires not only mitigating its effect but also to identify the corresponding source of attack. This process is called IP tracebac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002