Skip to main content

Overlay Logging: An IP Traceback Scheme in MPLS Network

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3421))

Abstract

IP traceback is an important task in Internet security area. Techniques have been developed to deploy in pure IP network, but, to date, no system has been presented to use the facility of MPLS in MPLS-enabled network. We present Overlay Logging, a technique combines the hash based logging (SPIE) and the convenience of setup overlay network in MPLS network. Our system can achieve a relatively lower false positive rate than SPIE, needs less hardware investment, and reduces the storage pressure. It is impervious to multi-path routing in the network. What’s more, the network overhead and configuration cost of our system is low.

Supported by: (1) the National Natural Science Foundation of China (No. 60473082 & No. 90104002 & No. 60373010); (2) the National Grand Fundamental Research 973 Program of China (No. 2003CB314801).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chang, R.K.C.: Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial. IEEE Commun. Mag., 42–51 (October 2002)

    Google Scholar 

  2. CERT Advisory CA-2000-01 Denial-of-service developments, [Online]. Available (January 2000), http://www.cert.org/advisories/CA-2000-01.html

  3. Sekar, R., Guang, Y., Verma, S., Shanbhag, T.: A High-Performance Network Intrusion Detection System. In: Proceedings of the 6th ACM conference on Computer and communications security, pp. 8–17 (1999)

    Google Scholar 

  4. Belenky, A., Ansari, N.: On IP traceback. IEEE Communications Magazine 41(7), 142–153 (2003)

    Article  Google Scholar 

  5. Snoeren, A.C., Partridge, C., Sanchez, L.A., Jones, C.E., Tchakountio, F., Schwartz, B., Kent, S.T., Strayers, W.T.: Single-Packet IP Traceback. IEEE/ACM Transactions on Networking 10(6), 721–734 (2002)

    Article  Google Scholar 

  6. Lee, T.-H., Wu, W.-K., Huang, T.-Y.W.: Scalable packet digesting schemes for IP traceback. In: 2004 IEEE International Conference on Communications, June 20-24, vol. 2, pp. 1008–1013 (2004)

    Google Scholar 

  7. Li, J., Sung, M., Xu, J., Li, L.: Large-scale IP traceback in high-speed internet: practical techniques and theoretical foundation. In: 2004 IEEE Symposium on Security and Privacy, Proceedings, May 9-12, pp. 115–129 (2004)

    Google Scholar 

  8. Stone, R.: Centertrack: An IP Overlay Network for Tracking DoS Floods. In: Proc. 9th USENIX Sec. Symp., pp. 199–212 (2000)

    Google Scholar 

  9. Savage, S., et al.: Network Support for IP Traceback. IEEE/ACM Trans. Net. 9(3), 226–237 (2001)

    Article  Google Scholar 

  10. Song, D.X., Perrig, A.: Advanced and Authenticated Marking Schemes for IP Traceback. In: Proc. INFOCOM, vol. 2, pp. 878–886 (2001)

    Google Scholar 

  11. Rosen, E., Viswanathan, A., Callon, R.: Multiprotocol Label Switching Architecture, RFC3031 (January 2001)

    Google Scholar 

  12. Belenky, A., Ansari, N.: IP traceback with deterministic packet marking. IEEE Communications Letters 7(4), 162–164 (2003)

    Article  Google Scholar 

  13. Park, K., Lee, H.: On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. In: INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, Proceedings, April 22-26, vol. 1, pp. 338–347. IEEE, Los Alamitos (2001)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wen, L., Jianping, W., Ke, X. (2005). Overlay Logging: An IP Traceback Scheme in MPLS Network. In: Lorenz, P., Dini, P. (eds) Networking - ICN 2005. ICN 2005. Lecture Notes in Computer Science, vol 3421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31957-3_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31957-3_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25338-9

  • Online ISBN: 978-3-540-31957-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics