Skip to main content

Modified Probabilistic Packet Marking Algorithm for IPv6 Traceback Using Chinese Remainder Theorem

  • Conference paper
  • First Online:
Innovations in Computer Science and Engineering

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 8))

Abstract

Denial of Service (DoS) attack is creating a major problem to the internet security. Probabilistic Packet Marking (PPM) algorithm suggested a methodology to overcome the DoS attacks. This methodology selects a packet based on probability to store a part of the IP address of the router in the attack path. The victim combines the marked parts of the IP address, to form the IP address in the attack path. These combinations also contain IP address of routers which are not part of the attack path. They are therefore called false positives. To overcome this drawback we proposed Modified Probabilistic Packet Marking (MPPM) algorithm for IPv6. The packets are now marked with the unique value and this unique value is calculated using Chinese Remainder Theorem (CRT) for every IP address of the router in the attack path. This technique requires less number of marked packets to find the exact IP address, thus reducing the number of false positives. Though IPv6 header length is four times that of IPv4, we could successfully obtain the exact IP address of all the routers in the attack path.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical Network Support for IP Traceback. In: ACM SIGCOMM conference, vol. 30. Issue 4, pp 295–306 (2000).

    Google Scholar 

  2. Song, D.X., Perrig, A.: Advanced and Authenticated Marking Schemes for IP Traceback. In: IEEE INFOCOM, pp. 878–886 (2001).

    Google Scholar 

  3. Dean, D., Franklin, M., Stubblefield, A.: An Algebraic Approach to IP Traceback. ACM Trans. Information and System Security, pp. 3–12 (2001).

    Google Scholar 

  4. Harsha K. Kalutarage., Siraj A. Shaikh., Indika P. Wickramasinghe., Qin Zhou., Anne E. James.: Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks. Computers and Electrical Engineering, vol. 47. pp. 327–344, (2015).

    Google Scholar 

  5. Park, K., Lee H.: On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial-of-Service Attacks. In: IEEE INFOCOM (2001).

    Google Scholar 

  6. Marion Vasseur., Xiuzhen Chen., Rida Khatoun., Ahmed Serhrouchni.: Survey on Packet Marking Fields and Information for IP Traceback. In: International Conference on Cyber Security of Smart cities, Industrial Control System and Communications (SSIC) (2015).

    Google Scholar 

  7. Karanpreet Singh., Paramvir Singh., Krishan Kumar.: A systematic review of IP traceback schemes for denial of service attacks. Computers & Security, vol. 56. pp 111–139, (2016).

    Google Scholar 

  8. The Statistics Portal, http://www.statista.com/topics/1145/internet-usage-worldwide.

  9. Xuan-Hien Dang, Emil Albright, Abdullah.: Performance analysis of probabilistic packet marking in IPv6. Computer Communications, vol. 30, pp 3193–3202 (2007).

    Google Scholar 

  10. Yulong Wang, Sui Tong, Yi Yang.: A practical hybrid IP traceback method for IPv6. Journal of Convergence Information Technology, vol. 7. pp. 173–182, (2012).

    Google Scholar 

  11. M. Hamedi-Hamzehkolaie., Chi Chen., Xue Tian., Reza Sanei., Masoud Khalil Nezhad., “Bee-Based IP Traceback”, 11th International Conference on Fuzzy Systems and Knowledge Discovery, pp 968–972 (2014).

    Google Scholar 

  12. Syed Obaid Amin, Myung Soo Kang, and Choong Seon Hong,: A light weight IP Traceback mechanism on IPv6. In: EUC workshops, LNCS 4097, pp. 671–680, (2006).

    Google Scholar 

  13. Long Cheng., Dinil Mon Divakaran., Wee Yong Lim., and Vrizlynn L. L.: Opportunistic Piggyback Marking for IP Traceback. IEEE Transactions on Information Forensics and Security, vol. 11. pp 2, (2016).

    Google Scholar 

  14. Bhavani Y., Janaki V., Sridevi R.: IP traceback through modified probabilistic packet marking algorithm using Chinese remainder theorem. Ain Shams Engineering Journal, vol. 6, pp 715–722, (2015).

    Google Scholar 

  15. Ahmad Fadlallah., “Adaptive Probabilistic Packet Marking Scheme for IP Traceback”, Computer Applications and Information Systems (WCCAIS), (2014).

    Google Scholar 

  16. Stephen, E., Deering, Robert, M., Hinden, Internet Protocol: Version 6 (IP v6) Specification, RFC 2460 (1998).

    Google Scholar 

  17. Bhavani, Y., Janaki, V., Sridevi, R.: IP traceback through Modified Probabilistic Packet Marking algorithm. In: IEEE Region 10 Conference TENCON (2013).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Y. Bhavani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Bhavani, Y., Janaki, V., Sridevi, R. (2017). Modified Probabilistic Packet Marking Algorithm for IPv6 Traceback Using Chinese Remainder Theorem. In: Saini, H., Sayal, R., Rawat, S. (eds) Innovations in Computer Science and Engineering. Lecture Notes in Networks and Systems, vol 8. Springer, Singapore. https://doi.org/10.1007/978-981-10-3818-1_28

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3818-1_28

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3817-4

  • Online ISBN: 978-981-10-3818-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics