Skip to main content

A Packet Marking Scheme for IP Traceback

  • Conference paper
Networking - ICN 2005 (ICN 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3421))

Included in the following conference series:

Abstract

DDoS attack is a big problem to the Internet community due to its high-profile, severe damage, and the difficulty in defending against it. Several countermeasures are proposed for it in the literature, among which, Probabilistic Packet Marking (PPM) first developed by Savage et al. is promising. However, the PPM marking schemes have the limitations in two main aspects: high computation overhead and large number of false positives. In this paper, a new packet marking scheme is proposed, which is more practical because of higher precision, and computationally more efficient compared with the PPM scheme proposed by Savage. Furthermore, this scheme can achieve a more higher precision than Advanced Marking Schemes in case of the victim knowing the map of its upstream routers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • CERT. CERT Statistics 1088-2003, http://www.cert.org/stats/

  • Park, K., Lee, H.: A Proactive Approach to Distributed DoS Attack Prevention using Route-Based Packet Filtering. Technical Report, CSD00 -017, Department of Computer Sciences, Purdue University (2000)

    Google Scholar 

  • Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical network support for IP traceback. In: Proc. of the 2000 ACM SIGCOMM Conf., Stockholm, Sweden, August 2000, pp. 295–306 (2000), http://www.acm.org/sigs/sigcomm/sigcomm2000/conf/paper/sigcomm2000-8-4.ps.gz

  • Cooperative Association for Internet Data Analysis (CAIDA). The Skitter project, http://www.caida.org/tools/measurement/skitter/

  • Theilmann, W., Rothermel, K.: Dynamic distance maps of the Internet. In: Proc. of the 2000 IEEE INFOCOM Conf., Tel Aviv, Israel (March 2000)

    Google Scholar 

  • Song, D.X., Perrig, A.: Advanced and authenticated marking schemes for IP traceback. In: Proc. of the IEEE INFOCOM 2001 (2001), http://www.ieee-infocom.org/2001/program.html

  • Li, D.-Q., Su, P.-R., Feng, D.-G.: Notes on Packet Marking for IP Traceback. Journal of Software 15(2) (2004)

    Google Scholar 

  • Park, K., Lee, H.: On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. In: Proceedings of IEEE INFOCOM 2001, pp. 338–347 (2001)

    Google Scholar 

  • Bellovin, S., Leech, M., Taylor, T.: ICMP Traceback Messages. work in progress, Internet Draft, draft-ietf-itrace-02.txt (October 2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Qu, H., Su, P., Lin, D., Feng, D. (2005). A Packet Marking Scheme for IP Traceback. In: Lorenz, P., Dini, P. (eds) Networking - ICN 2005. ICN 2005. Lecture Notes in Computer Science, vol 3421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31957-3_109

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31957-3_109

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25338-9

  • Online ISBN: 978-3-540-31957-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics