Adjusted Probabilistic Packet Marking for IP Traceback

作者: Tao Peng , Christopher Leckie , Kotagiri Ramamohanarao

DOI: 10.1007/3-540-47906-6_56

关键词: Spoofing attackInternet ProtocolComputer securityThe InternetSmurf attackIP tracebackComputer networkDenial-of-service attackComputer scienceProbabilistic logicNetwork packet

摘要: Distributed denial-of-service attack is one of the greatest threats to Internet today. One biggest difficulties in defending against this that attackers always use incorrect, or "spoofed" IP source addresses disguise their true origin. In paper, we present a packet marking algorithm which allows victim traceback approximate origin spoofed packets. The difference between proposal and previous proposals lies two points. First, develop three techniques adjust probability, significantly reduces number packets needed by reconstruct path. Second, give detailed analysis vulnerabilities probabilistic marking, describe version our adjusted scheme whose performance not affected fields.

参考文章(15)
Adam Stubblefield, Drew Dean, Matthew K. Franklin, An Algebraic Approach to IP Traceback. network and distributed system security symposium. ,(2001)
Steven Bellovin, Marcus Leech, Tom Taylor, ICMP Traceback Messages Internet Draft: draft-bellovin-itrace-00. txt. ,(2003) , 10.7916/D8FF406R
John Douglas Howard, An analysis of security incidents on the Internet 1989-1995 Carnegie Mellon University. ,(1998)
D. Senie, P. Ferguson, Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing RFC 2827-BCP 38. ,vol. 2267, pp. 1- 10 ,(1998)
Stefan Savage, David Wetherall, Anna Karlin, Tom Anderson, Practical network support for IP traceback acm special interest group on data communication. ,vol. 30, pp. 295- 306 ,(2000) , 10.1145/347057.347560
Ion Stoica, Hui Zhang, Providing guaranteed services without per flow management acm special interest group on data communication. ,vol. 29, pp. 81- 94 ,(1999) , 10.1145/316188.316208
Kihong Park, Heejo Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack international conference on computer communications. ,vol. 1, pp. 338- 347 ,(2001) , 10.1109/INFCOM.2001.916716
Hal Burch, None, Tracing Anonymous Packets to Their Approximate Source usenix large installation systems administration conference. pp. 319- 328 ,(2000)
W. Theilmann, K. Rothermel, Dynamic distance maps of the Internet international conference on computer communications. ,vol. 1, pp. 275- 284 ,(2000) , 10.1109/INFCOM.2000.832197
Alex C. Snoeren, Hash-based IP traceback Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '01. ,vol. 31, pp. 3- 14 ,(2001) , 10.1145/383059.383060