Abstract
In the modernized era, numerous types of attacks are espied on the Internet, along with the utmost destructive attacks, Distributed Denial of Service (DDoS) Attacks. After these types of attacks, legitimate users are not able to access the authorized services. IP Traceback scheme is the only way to trace the original source of the attack. Researchers have been implemented various traceback schemes in the past, but none are able to provide comprehensive efficient results in terms of marking rate and traceback rate. In this paper, we proposed a hybrid approach based on star coloring with autonomous systems, which depicts improved results in terms of marking rate and traceback rates. The simulation results are shown and compared with previous dataset CAIDA.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Burch, H., Cheswick, B.: Tracing anonymous packets to their approximate source. In: Proceedings of USENIX LISA, Dec 2000
Ihab, F.H., Kesidis, G.: Performance of IP address fragmentation strategies for DDoS traceback. In: 3rd IEEE Workshop on IP Operations and Management, 2003 (IPOM 2003), pp. 1–7. IEEE (2003)
Paruchuri, V., Durresi, A., Barolli, L.: FAST: fast autonomous system traceback. In: 21st International Conference on Advanced Information Networking and Applications (AINA2007), pp. 498–505, May 2007
Belenky, A., Ansari, N.: IP traceback with deterministic packet marking. IEEE Commun. Lett. 7(4), 162–164 (2003)
Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Network support for IP traceback. IEEE/ACM Trans. Netw. (TON) 9(3), 226–237 (2001)
Peng, T., Leckie, C., Ramamohanarao, K.: Adjusted probabilistic packet marking for IP traceback. In: International Conference on Research in Networking, pp. 697–708. Springer, Berlin, Heidelberg (2002)
Adler, M.: Tradeoffs in probabilistic packet marking for IP traceback. In: Proceedings of 34th ACM Symposium on Theory of Computing (STOC 2001)
Ma, M.: Tabu marking schemes for traceback. In: IPDPS (2005)
Choi, K.H., Dai, H.K.: A marking scheme using Huffman codes for IP traceback. In: 7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings, pp. 421–428. IEEE (2004)
Yang, M.-H., Yang, M.-C.: RIHT: a novel hybrid IP traceback scheme. IEEE Trans. Inf. Forensics Secur. 7(2), 789–797 (2012)
Aghaei-Foroushani, V., Nur Zincir-Heywood, A.: Autonomous system based flow marking scheme for IP-Traceback. In: Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP, pp. 121–128. IEEE (2016)
Roy, S., Singh, A., Sairam, A.S.: IP traceback in star colored networks. In: 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS), pp. 1–9. IEEE (2013)
Muthuprasanna, M., Manimaran, G., Alicherry, M., Kumar, V.: Coloring the Internet: IP traceback. In: 12th International Conference on Parallel and Distributed Systems-(ICPADS’06), vol. 1, 8 pp. IEEE (2006)
Yaar, A., Perrig, A., Song, D.: FIT: fast Internet traceback. In: Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 1395–1406. IEEE (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Vipul, Ranga, V. (2019). Hybrid Traceback Scheme for DDoS Attacks. In: Sa, P., Bakshi, S., Hatzilygeroudis, I., Sahoo, M. (eds) Recent Findings in Intelligent Computing Techniques . Advances in Intelligent Systems and Computing, vol 707. Springer, Singapore. https://doi.org/10.1007/978-981-10-8639-7_14
Download citation
DOI: https://doi.org/10.1007/978-981-10-8639-7_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8638-0
Online ISBN: 978-981-10-8639-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)