Abstract
IP traceback technology is an important means combating Denial of Service (DoS) attacks in Internet. This paper proposes a new IP traceback scheme constituting two parts: the first part is constructing a traceback tree by integrating Deterministic Packet Marking and Probabilistic Packet Marking, and the second part is getting attack routes by analyzing this traceback tree. Basing on performance analysis, we point out that our scheme is both efficient and robust against mark field spoofing.
Chapter PDF
Similar content being viewed by others
Keywords
References
Denial of Service Attacks, CERT Coordination Center (October 1997), Available at http://www.cert.org/tech_tips/denial_of_service.html
Houle, K.J., Weaver, G.M., Long, N., Thomas, R.: Trends in Denial of Service Attack Technology, CERT Coordination Center (October 2001)
Garber, L.: Denial-of-service attacks rip the Internet. Computer, pp. 12–17 (April 2000)
Ferguson, P., Senie, D.: Network ingress filtering: Defeating denial-of-service attacks which employ IP source address spoofing., RFC 2827 (2000)
Denial Of Service Attacks – A Survey, CERT Coordination Center, Draft (Work in progress)
Savage, S., et al.: Practical Network Support for IP Trace-back. In: Proc. 2000 ACM SIGCOMM, August 2000, vol. 30(4), pp. 295–306. ACM Press, New York (2000)
Burch, H., Cheswick, B.: Tracing anonymous packets to their approximate source. In: Proc. 2000 USENIX LISA Conf., December 2000, pp. 319–327 (2000)
Baba, T., Matsuda, S.: Tracing Network Attacks to Their Sources. IEEE Internet Computing March ·, pp. 20–26 (April 2002)
Park, K., Lee, H.: On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack. In: Proc. IEEE INFOCOM 2001 (2001)
Bellovin, S., Leech, M., Taylor, T.: ICMP Traceback Messages, Internet draft, work in progress (expires July 2003) (January 2003), Available online at http://www.ietf.org/internet-drafts/draft-ietfitrace-03.txt
Postel, J.: Internet protocol., RFC 791 (1981)
Snoeren, A.C., Partridge, C., Sanchez, L.A., et al.: Hash-Based IP Traceback. In: Proc. 2000 ACM SIGCOMM (2000)
Dean, D., Franklin, M., Stubblefield, A.: An algebraic approach to IP traceback. In: Network and Distributed System Security Symposium, NDSS 2001 (2001)
Sung, M., Xu, J.: IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks. In: 10th IEEE International Conference on Network Protocols (ICNP 2002), November 12-15 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Min, F., Zhang, Jy., Yang, Gw. (2003). An IP Traceback Scheme Integrating DPM and PPM. In: Zhou, J., Yung, M., Han, Y. (eds) Applied Cryptography and Network Security. ACNS 2003. Lecture Notes in Computer Science, vol 2846. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45203-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-540-45203-4_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20208-0
Online ISBN: 978-3-540-45203-4
eBook Packages: Springer Book Archive