Skip to main content

An Adaptive Edge Marking Based Hierarchical IP Traceback System

  • Conference paper
Networking and Mobile Computing (ICCNMC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3619))

Included in the following conference series:

Abstract

IP traceback is one of the most effective techniques to defeat the denial-of-service attacks and distributed denial-of-service attacks. And in terms of previous research fruits, the technique based on probabilistic packet marking (PPM) has been proven that it has more advantages than other IP traceback techniques. In this paper, we present a hierarchical IP traceback system, which is more practical and can be implemented and deployed more conveniently and securely than previous end-host schemes. We also present an improved edge marking algorithm called adaptive edge marking scheme (AEMS), which not only can shorten the convergence time, but also be more stable and robust. And detailed theoretical analysis and simulation results have also been presented to show the advantage and efficiency of this scheme.

Supported by the National Natural Science Foundation of China under Grant No. 60373021.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Moore, D., Voelker, G., Savage, S.: Inferring Internet denial-of-service activity. In: The 10th ACM USENIX Security Symposium, Washington D.C. (November 2002)

    Google Scholar 

  2. Chunhe, X., Haiquan, W., et al.: Research on tracing attacks. Journal of Computer Research and Development 40(7), 1021–1027 (2003) (in Chinese)

    Google Scholar 

  3. Ferguson, P., Senie, D.: Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing. RFC 2267 (January 1998)

    Google Scholar 

  4. Burch, H., Cheswick, B.: Tracing anonymous packets to their approximate source. Unpublished paper (December 1999)

    Google Scholar 

  5. Sager, G.: Security fun with ocxmon and cflowd. Presentation at the Internet 2 Working Group (November 1998)

    Google Scholar 

  6. Stone, R.: Centertrack: An IP overlay network for tracking DoS floods. In: Proc. USENIX Security Symposium 2000 (August 2000)

    Google Scholar 

  7. Snoeren, A.C., Partridge, C., Sanchez, L.A., et al.: Hash-based IP traceback. In: Proceedings of the 2001 ACM SIGCOMM Conference, California, USA (August 2001)

    Google Scholar 

  8. Bellovin, S.: The ICMP traceback message (2000), http://www.research.att.com/~smb

  9. Mankin, D., Massey, C., Wu, S.F., Zhang, L.: On Design and Evaluation of Intention-Driven ICMP Traceback. In: Proceedings of IEEE International Conference on Computer Communications and Networks (2001)

    Google Scholar 

  10. Savage, S., Wetherall, D., Karlin, A., et al.: Practical network support for IP traceback1. In: Proc. ACM SIGCOMM Conf. 2000. Stockholm, Sweden, pp. 295–306 (2000)

    Google Scholar 

  11. Song, D.X., Perrig, A.: Advanced and authenticated marking schemes for IP traceback. In: Proc. IEEE INFOCOM 2001, Alaska, USA (2001)

    Google Scholar 

  12. Stoica, I., Zhang, H.: Providing guaranteed services without per flow management. In: Proceedings of the 1999 ACM SIGCOMM Conference, Boston, MA, pp. 81–94 (1999)

    Google Scholar 

  13. CAIDA. Skitter, http://www.caida.org/tools/measurement/skitter/index.xml (2004-07-08/2004-12-30)

  14. Peng, T., Leckie, C., Kotagiri, R.: Adjusted Probabilistic Packet Marking for IP Traceback. In: Proceedings of the Second IFIP Networking Conference (Networking 2002), Pisa, Italy, May 2002, pp. 697–708 (2002)

    Google Scholar 

  15. Network Simulator 2, http://www.isi.edu/nsnam/ns (2004-07-10)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jing, Y., Li, J., Zhang, G. (2005). An Adaptive Edge Marking Based Hierarchical IP Traceback System. In: Lu, X., Zhao, W. (eds) Networking and Mobile Computing. ICCNMC 2005. Lecture Notes in Computer Science, vol 3619. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11534310_124

Download citation

  • DOI: https://doi.org/10.1007/11534310_124

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28102-3

  • Online ISBN: 978-3-540-31868-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics