skip to main content
10.1145/1368310.1368337acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

A general model of probabilistic packet marking for IP traceback

Published:18 March 2008Publication History

ABSTRACT

In this paper, we model Probabilistic Packet Marking (PPM) schemes for IP traceback as an identification problem of a large number of markers. Each potential marker is associated with a distribution on tags, which are short binary strings. To mark a packet, a marker follows its associated distribution in choosing the tag to write in the IP header. Since there are a large number of (for example, over 4,000) markers, what the victim receives are samples from a mixture of distributions. Essentially, traceback aims to identify individual distribution contributing to the mixture. Guided by this model, we propose Random Packet Marking (RPM), a scheme that uses a simple but effective approach. RPM does not require sophisticated structure/relationship among the tags, and employs a hop-by-hop reconstruction similar to AMS [16]. Simulations show improved scalability and traceback accuracy over prior works. For example, in a large network with over 100K nodes, 4,650 markers induce 63% of false positives in terms of edges identification using the AMS marking scheme; while RPM lowers it to 2%. The effectiveness of RPM demonstrates that with prior knowledge of neighboring nodes, a simple and properly designed marking scheme suffices in identifying large number of markers with high accuracy.

References

  1. Internet mapping project. Research, Lumeta, Jan. 2006.Google ScholarGoogle Scholar
  2. Anomalous DNS activity. Current activity archive, US-CERT, Feb. 6, 2007.Google ScholarGoogle Scholar
  3. M. Adler. Tradeoffs in probabilistic packet marking for IP traceback. In Proceedings of ACM Symposium on Theory of Computing (STOC), Nov. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. B. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the Association for Computing Machinery, 13(7):422--426, 1970. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Bellovin, M. Leech, and T. Taylor. ICMP traceback messages. Internet draft, IETF, draft-ietf-itrace-01.txt, Oct. 2001.Google ScholarGoogle Scholar
  6. B. Chor, A. Fiat, and M. Naor. Tracing traitors. In Proceedings of CRYPTO, pages 257--270, Aug. 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. Dean, M. Franklin, and A. Stubblefield. An algebraic approach to IP traceback. ACM Transactions on Information and System Security, 5(2):119--137, May. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. L. Garber. Denial-of-service attacks rip the Internet. IEEE Computer, 33(4):12--17, Apr. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Goodrich. Efficient packet marking for large-scale IP traceback. In Proceedings of ACM CCS, pages 117--126, Nov. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Li, M. Sung, J. Xu, and L. Li. Large-scale IP traceback in high-speed Internet: Practical techniques and theoretical foundation. In Proceedings of IEEE S&P, May. 2004.Google ScholarGoogle Scholar
  11. A. Mankin, D. Massey, C.-L. Wu, S. Wu, and L. Zhang. On design and evaluation of intention-driven ICMP traceback. In Proceedings of IEEE Computer Communications and Networks, Oct. 2001.Google ScholarGoogle ScholarCross RefCross Ref
  12. D. McGuire and B. Krebs. Attack on Internet called largest ever. Oct. 2002.Google ScholarGoogle Scholar
  13. K. Park and H. Lee. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. In Proceedings of SIGCOMM, pages 15--26, Aug. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical network support for IP traceback. In Proceedings of SIGCOMM, Aug. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Snoeren, C. Partridge, L. Sanchez, C. Jones, F. Tchakountio, S. Kent, and W. Strayer. Hash-based IP traceback. In Proceedings of ACM SIGCOMM, Aug. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. D. X. Song and A. Perrig. Advanced and authenticated marking schemes for IP traceback. In Proceedings of IEEE INFOCOM, pages 878--886, Apr. 2001.Google ScholarGoogle Scholar
  17. I. Stoica and H. Zhang. Providing guaranteed services without per flow management. In Proceedings of ACM SIGCOMM, Aug. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. W. Trappe, M. Wu, Z. J. Wang, and K. J. R. Liu. Anti-collusion fingerprinting for multimedia. IEEE Transactions on Signal Processing, 51(4):1069--1087, Apr. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Waldvogel. GOSSIB vs. IP traceback rumors. In Proceedings of Annual Computer Security Applications Conference (ACSAC), Dec. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Yaar, A. Perrig, and D. Song. Fit: Fast Internet traceback. In Proceedings of IEEE INFOCOM, pages 1395--1406, Mar. 2005.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security
    March 2008
    399 pages
    ISBN:9781595939791
    DOI:10.1145/1368310

    Copyright © 2008 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 18 March 2008

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate418of2,322submissions,18%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader