Abstract
IP traceback is one of the most effective techniques to defeat the denial-of-service attacks and distributed denial-of-service attacks. And in terms of previous research fruits, the technique based on probabilistic packet marking (PPM) has been proven that it has more advantages than other IP traceback techniques. In this paper, we present a hierarchical IP traceback system, which is more practical and can be implemented and deployed more conveniently and securely than previous end-host schemes. We also present an improved edge marking algorithm called adaptive edge marking scheme (AEMS), which not only can shorten the convergence time, but also be more stable and robust. And detailed theoretical analysis and simulation results have also been presented to show the advantage and efficiency of this scheme.
Supported by the National Natural Science Foundation of China under Grant No. 60373021.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Moore, D., Voelker, G., Savage, S.: Inferring Internet denial-of-service activity. In: The 10th ACM USENIX Security Symposium, Washington D.C. (November 2002)
Chunhe, X., Haiquan, W., et al.: Research on tracing attacks. Journal of Computer Research and Development 40(7), 1021–1027 (2003) (in Chinese)
Ferguson, P., Senie, D.: Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing. RFC 2267 (January 1998)
Burch, H., Cheswick, B.: Tracing anonymous packets to their approximate source. Unpublished paper (December 1999)
Sager, G.: Security fun with ocxmon and cflowd. Presentation at the Internet 2 Working Group (November 1998)
Stone, R.: Centertrack: An IP overlay network for tracking DoS floods. In: Proc. USENIX Security Symposium 2000 (August 2000)
Snoeren, A.C., Partridge, C., Sanchez, L.A., et al.: Hash-based IP traceback. In: Proceedings of the 2001 ACM SIGCOMM Conference, California, USA (August 2001)
Bellovin, S.: The ICMP traceback message (2000), http://www.research.att.com/~smb
Mankin, D., Massey, C., Wu, S.F., Zhang, L.: On Design and Evaluation of Intention-Driven ICMP Traceback. In: Proceedings of IEEE International Conference on Computer Communications and Networks (2001)
Savage, S., Wetherall, D., Karlin, A., et al.: Practical network support for IP traceback1. In: Proc. ACM SIGCOMM Conf. 2000. Stockholm, Sweden, pp. 295–306 (2000)
Song, D.X., Perrig, A.: Advanced and authenticated marking schemes for IP traceback. In: Proc. IEEE INFOCOM 2001, Alaska, USA (2001)
Stoica, I., Zhang, H.: Providing guaranteed services without per flow management. In: Proceedings of the 1999 ACM SIGCOMM Conference, Boston, MA, pp. 81–94 (1999)
CAIDA. Skitter, http://www.caida.org/tools/measurement/skitter/index.xml (2004-07-08/2004-12-30)
Peng, T., Leckie, C., Kotagiri, R.: Adjusted Probabilistic Packet Marking for IP Traceback. In: Proceedings of the Second IFIP Networking Conference (Networking 2002), Pisa, Italy, May 2002, pp. 697–708 (2002)
Network Simulator 2, http://www.isi.edu/nsnam/ns (2004-07-10)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jing, Y., Li, J., Zhang, G. (2005). An Adaptive Edge Marking Based Hierarchical IP Traceback System. In: Lu, X., Zhao, W. (eds) Networking and Mobile Computing. ICCNMC 2005. Lecture Notes in Computer Science, vol 3619. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11534310_124
Download citation
DOI: https://doi.org/10.1007/11534310_124
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28102-3
Online ISBN: 978-3-540-31868-2
eBook Packages: Computer ScienceComputer Science (R0)