Skip to main content

Reflector Attack Traceback System with Pushback Based iTrace Mechanism

  • Conference paper
  • 844 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3269))

Abstract

Reflector attack belongs to one of the most serious types of Distributed Denial-of-Service (DDoS) attacks, which can hardly be traced by traceback techniques, since the marked information written by any routers between the attacker and the reflectors will be lost in the replied packets from the reflectors. In response to such attacks, advanced IP traceback technology must be suggested. This study proposed an improved iTrace technique that identifies DDoS traffics with Pushback based multi-hop iTrace mechanism based on authenticated packet marking information at reflector for malicious reflector source trace and cope with DDoS attack packets efficiently.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Elliott, J.: Distributed Denial of Service Attack and the Zombie and Effect. IP professional (March/April 2000)

    Google Scholar 

  2. Garber, L.: Denial-of-Service attacks trip the Internet. Computer, p. 12 (April 2000)

    Google Scholar 

  3. Belenky, A., Ansari, N.: On IP Traceback. IEEE Communication Magazine, 142–153 (July 2003)

    Google Scholar 

  4. Baba, T., Matsuda, S.: Tracing Network Attacks to Their Sources. IEEE Internet Computing, 20–26 (March 2002)

    Google Scholar 

  5. Paxson, V.: An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks. ACM Comp. Commun. Rev. 31(3), 3–14 (2001)

    Google Scholar 

  6. Chang, R.K.C.: Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Communications Magazine 40(10), 42–51 (2002)

    Article  Google Scholar 

  7. Bellovin, S., Taylor, T.: ICMP Traceback Messages. RFC 2026, Internet Engineering Task Force (February 2003)

    Google Scholar 

  8. Ferguson, P., Senie, D.: Network ingress Filtering: Defeating denial of service attacks which employ IP source address spoofing, RFC 2827 (May 2000)

    Google Scholar 

  9. Park, K., Lee, H.: On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. In: Proc. IEEE INFOCOM 2001, pp. 338–347 (2001)

    Google Scholar 

  10. Song, D.X., Perrig, A.: Advanced and AuthenticatedMarking Scheme for IP Traceback. In: Proc. Infocom, vol. 2, pp. 878–886 (2001)

    Google Scholar 

  11. Floyd, S., Bellovin, S., Ioannidis, J., Kompella, K., Mahajan, R., Paxson, V.: Pushback Message for Controlling Aggregates in the Network. Internet Draft (2001)

    Google Scholar 

  12. Computer Emergency Response Team, TCP SYN flooding and IP Spoofing attacks, CERT Advisory CA-1996-21 (September 1996)

    Google Scholar 

  13. Paxson, V.: An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks. ACM SIGCOMM, Computer Communication Review, 38–47 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, HW., Yun, SH., Kwon, T., Kim, JS., Park, HU., Oh, NH. (2004). Reflector Attack Traceback System with Pushback Based iTrace Mechanism. In: Lopez, J., Qing, S., Okamoto, E. (eds) Information and Communications Security. ICICS 2004. Lecture Notes in Computer Science, vol 3269. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30191-2_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30191-2_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23563-7

  • Online ISBN: 978-3-540-30191-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics