NISp1-05: RIM: Router Interface Marking for IP Traceback

作者: Ruiliang Chen , Jung-Min Park , Randolph Marchany

DOI: 10.1109/GLOCOM.2006.312

关键词:

摘要: Distributed Denial-of-Service (DDoS) attacks have become a major threat to the Internet. As countermeasure against DDoS attacks, IP traceback schemes identify network paths attack traffic traverses. This paper presents novel scheme called Router Interface Marking (RIM). In RIM, router probabilistically marks packets with interface's identifier. After collecting marked by each in an path, victim machine can use information trace back source. Different from most existing schemes, RIM of interfaces rather than that addresses. difference endows several advantageous features, including fast speed, last-hop capability, small computation overhead, low occurrence false positives, and enhanced security.

参考文章(13)
Randolph Marchany, Jung-Min Park, Ruiliang Chen, TRACK: A Novel Approach for Defending Against Distributed Denial-of-Service Attacks ,(2005)
A. Yaar, A. Perrig, D. Song, FIT: fast Internet traceback international conference on computer communications. ,vol. 2, pp. 1395- 1406 ,(2005) , 10.1109/INFCOM.2005.1498364
Stefan Savage, David Wetherall, Anna Karlin, Tom Anderson, Practical network support for IP traceback acm special interest group on data communication. ,vol. 30, pp. 295- 306 ,(2000) , 10.1145/347057.347560
Drew Dean, Matt Franklin, Adam Stubblefield, An algebraic approach to IP traceback ACM Transactions on Information and System Security. ,vol. 5, pp. 119- 137 ,(2002) , 10.1145/505586.505588
Cheng Jin, Haining Wang, Kang G. Shin, Hop-count filtering: an effective defense against spoofed DDoS traffic computer and communications security. pp. 30- 41 ,(2003) , 10.1145/948109.948116
Haining Wang, Cheng Jin, Kang G. Shin, Defense against spoofed IP traffic using hop-count filtering IEEE ACM Transactions on Networking. ,vol. 15, pp. 40- 53 ,(2007) , 10.1109/TNET.2006.890133
Alex C. Snoeren, Hash-based IP traceback Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '01. ,vol. 31, pp. 3- 14 ,(2001) , 10.1145/383059.383060
Jun Li, Minho Sung, Jun Xu, Li Li, Large-scale IP traceback in high-speed Internet: practical techniques and theoretical foundation ieee symposium on security and privacy. pp. 115- 129 ,(2004) , 10.1109/SECPRI.2004.1301319
Chao Gong, K. Sarac, IP traceback based on packet marking and logging international conference on communications. ,vol. 2, pp. 1043- 1047 ,(2005) , 10.1109/ICC.2005.1494507
Michael T. Goodrich, Efficient packet marking for large-scale IP traceback Proceedings of the 9th ACM conference on Computer and communications security - CCS '02. pp. 117- 126 ,(2002) , 10.1145/586110.586128