Overview of Traceback Mechanisms and Their Applicability

作者: Heung-Youl YOUM

DOI: 10.1587/TRANSINF.E94.D.2077

关键词: Network packetComputer securityThe InternetEvent (computing)Overlay networkComputer networkComputer scienceDenial-of-service attack

摘要: As an increasing number of businesses and services depend on the Internet, protecting them against DDoS (Distributed Denial Service) attacks becomes a critical issue. A traceback is used to discover technical information concerning ingress points, paths, partial paths or sources packet packets causing problematic network event. The mechanism useful tool identify attack source (DDoS) attack, which ultimately leads preventing attack. There are numerous mechanisms that have been proposed by many researchers. In this paper, we analyze existing mechanisms, describe common security capabilities evaluate in terms various criteria. addition, typical application mechanisms.

参考文章(39)
J. Immanuel John Raja, Shweta Vincent, A survey of IP traceback mechanisms to overcome denial-of-service attacks international conference on networking. pp. 93- 98 ,(2010)
Robert Stone, Centertrack: an IP overlay network for tracking DoS floods usenix security symposium. pp. 15- 15 ,(2000)
Vijay Varadharajan, Udaya Kiran Tupakula, Analysis of traceback techniques grid computing. pp. 115- 124 ,(2006)
Steven Michael Bellovin, William R. Cheswick, Privacy-Enhanced Searches Using Encrypted Bloom Filters IACR Cryptology ePrint Archive. ,vol. 2004, pp. 22- ,(2007) , 10.7916/D8MK6MR2
Bao-Tung Wang, H. Schulzrinne, A denial-of-service-resistant IP traceback approach international symposium on computers and communications. ,vol. 1, pp. 351- 356 ,(2004) , 10.1109/ISCC.2004.1358429
A. Mankin, D. Massey, Chien-Lung Wu, S.F. Wu, Lixia Zhang, On design and evaluation of "intention-driven" ICMP traceback international conference on computer communications and networks. pp. 159- 165 ,(2001) , 10.1109/ICCCN.2001.956234
W.T. Strayer, C.E. Jones, F. Tchakountio, R.R. Hain, SPIE-IPv6: single IPv6 packet traceback local computer networks. pp. 118- 125 ,(2004) , 10.1109/LCN.2004.118
Danny McPherson, Warren Kumari, Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF) RFC. ,vol. 5635, pp. 1- 15 ,(2009)
A. Yaar, A. Perrig, D. Song, FIT: fast Internet traceback international conference on computer communications. ,vol. 2, pp. 1395- 1406 ,(2005) , 10.1109/INFCOM.2005.1498364
Andre Castelucio, Artur Ziviani, Ronaldo Salles, An AS-level overlay network for IP traceback IEEE Network. ,vol. 23, pp. 36- 41 ,(2009) , 10.1109/MNET.2009.4804322