Abstract
Recently, DDoS attacks are more and more serious to the Internet. Many specialists research the defending methods against DDoS. Pi had been proposed as one of the defense methods against complicated DDoS attack by spoofed IP address. Pi is a new packet marking approach, and Pi enables a victim to identify packets traversing the same paths through the Internet on a per packet basis, regardless of source IP address spoofing. Marking size of Pi is the most important parameter of Pi marking scheme to decide the performance of Pi. At the end hosts’ view, the most proper marking size of Pi is affected by the Internet environment and its topology. In existing Pi scheme, Pi filter deployed on the ISP’s side of the last hop link, but this paper consider the Pi filter deployed at end host in the ISP and tried to find the most proper marking size.
This study was supported by the Brain Korea 21 Project in 2004.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Yaar, A., Perrig, A., Song, D.: Pi: A Path Identification Mechanism to Defend against DDoS Attacks. In: Proceeding of Symposium on Security and Privacy 2003, pp. 93–107 (2003)
CAIDA. Skitter (2000), http://www.caida.org/tools/measurement/skitter/
Chen, Z., Lee, M.: An IP traceback technique against denial-of-service attacks. In: Proceeding of 19th Annual Computer Security Applications Conference, pp. 96–104 (2003)
Berkeley University. The Spread of the Sapphire/Slammer Worm (2002), http://www.cs.berkeley.edu/~nweaver/sapphire/
Computer Emergency Response Team(CERT). TCP_SYN flooding and IP spoofing attacks. Technical Report CA-96:21. Carnegie Mellon University. Pittsburgh, PA (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, SD., Hong, MP., Kim, DK. (2004). A Study on Marking Bit Size for Path Identification Method: Deploying the Pi Filter at the End Host. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3046. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24768-5_65
Download citation
DOI: https://doi.org/10.1007/978-3-540-24768-5_65
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22060-2
Online ISBN: 978-3-540-24768-5
eBook Packages: Springer Book Archive