Skip to main content

An Intelligent Approach of Packet Marking at Edge Router for IP Traceback

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3683))

  • 1077 Accesses

Abstract

With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of source identification, and there are some issues on it. For large amount of packets, analysis time and complicated computation are necessary while detect marking information. This paper focuses on this direction, and proposes a simple and efficient method to mark all packets belonging to upstream traffic with a deterministic, plain form identity. With this approach, we just need low processing power on some specific edge routers as well as a little extra network traffic to settle it. Furthermore, distilling mark from packets is easy since the mark is in plain text format.

This work was supported by University ITRC Project of MIC

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Belenky, A., Ansari, N.: IP Traceback with Deterministic Packet Marking. IEEE Communications Letters 7(4), 162–164 (2003)

    Article  Google Scholar 

  2. Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Network support for IP traceback. IEEE/ACM Trans. Networking 9, 226–237 (2001)

    Article  Google Scholar 

  3. Forouzan, B.A., Fegan, S.C.: TCP/IP Protocol Suite. ch. 7, pp. 152–153

    Google Scholar 

  4. Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical Network Support for IP Traceback. In: Proc. of the ACM SIGCOMM conference, Stockholm, Sweden (August 2000); Computer Communication Review 30(4) (October 2000)

    Google Scholar 

  5. A Little Background on Trace Back, discovery.csc.ncsu.edu/pning/Courses/csc774/on-trace-back.pdf

  6. Yaar, A., Perrig, A., Song, D.: Pi: A Path Identification Mechanism to Defend against DDoS Attacks. In: Proceedings of the 2003 Security and Privacy Symposium (May 2003)

    Google Scholar 

  7. Sung, M., Xu, J.: IP Traceback-based Intelligent Packet Filtering: A Novel Technique for Defending Against Internet DDoS Attacks. IEEE Transactions on Parallel and Distributed Systems 14(9), 861–872 (2003)

    Article  Google Scholar 

  8. Snoeren, A.C., et al.: Hash-Based IP Traceback. In: Proc. of the ACM SIGCOMM conference 2001, San Diego, CA, October 2001. Computer Communication Review, vol. 31(4), pp. 3–14 (2001)

    Google Scholar 

  9. Snoeren, A., Partridge, C., Sanchez, L., Jones, C., Tchakountio, F., Schwartz, B., Kent, S., Strayer, W.: Single-Packet IP Traceback. ACM/IEEE Transactions on Networking 10(6) (December 2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, D.S., Hong, C.S., Xiang, Y. (2005). An Intelligent Approach of Packet Marking at Edge Router for IP Traceback. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3683. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11553939_44

Download citation

  • DOI: https://doi.org/10.1007/11553939_44

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28896-1

  • Online ISBN: 978-3-540-31990-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics