FIT: fast Internet traceback

作者: A. Yaar , A. Perrig , D. Song

DOI: 10.1109/INFCOM.2005.1498364

关键词: Computer networkIP tracebackRouterIP address spoofingQuality of serviceDenial-of-service attackDomain Name SystemComputer securityComputer scienceThe InternetNetwork packet

摘要: Traceback mechanisms are a critical part of the defense against IP spoofing and DoS attacks, as well being forensic value to law enforcement. Currently proposed traceback inadequate address problem for following reasons: they require DDoS victims gather thousands packets reconstruct single attack path; do not scale large distributed attacks; support incremental deployment. We propose fast Internet (FIT), new packet marking approach that significantly improves in several dimensions: (1) can identify paths with high probability after receiving only tens packets, reduction 1-3 orders magnitude compared previous schemes; (2) FIT performs even presence legacy routers, allowing every FIT-enabled router path be identified; (3) scales attacks attackers. Compared schemes, represents step forward performance deployability.

参考文章(19)
Chris Karlof, Naveen Sastry, Adrian Perrig, J. D. Tygar, Yaping Li, Distillation Codes and Applications to DoS Resistant Multicast Authentication network and distributed system security symposium. ,(2004)
Steven Bellovin, Marcus Leech, Tom Taylor, ICMP Traceback Messages Internet Draft: draft-bellovin-itrace-00. txt. ,(2003) , 10.7916/D8FF406R
Y. Rekhter, Address Allocation for Private Internets RFC. ,vol. 1597, pp. 1- 8 ,(1994)
T. Dierks, C. Allen, The TLS Protocol Version 1.0 IETF RFC 2246. ,vol. 2246, pp. 1- 80 ,(1999)
Stefan Savage, David Wetherall, Anna Karlin, Tom Anderson, Practical network support for IP traceback acm special interest group on data communication. ,vol. 30, pp. 295- 306 ,(2000) , 10.1145/347057.347560
Micah Adler, Tradeoffs in probabilistic packet marking for IP traceback symposium on the theory of computing. pp. 407- 418 ,(2002) , 10.1145/509907.509969
Drew Dean, Matt Franklin, Adam Stubblefield, An algebraic approach to IP traceback ACM Transactions on Information and System Security. ,vol. 5, pp. 119- 137 ,(2002) , 10.1145/505586.505588
Cheng Jin, Haining Wang, Kang G. Shin, Hop-count filtering: an effective defense against spoofed DDoS traffic computer and communications security. pp. 30- 41 ,(2003) , 10.1145/948109.948116
Kihong Park, Heejo Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack international conference on computer communications. ,vol. 1, pp. 338- 347 ,(2001) , 10.1109/INFCOM.2001.916716
Hal Burch, None, Tracing Anonymous Packets to Their Approximate Source usenix large installation systems administration conference. pp. 319- 328 ,(2000)