On deterministic packet marking
نویسندگان
چکیده
In this article, we present a novel approach to IP Traceback – deterministic packet marking (DPM). DPM is based on marking all packets at ingress interfaces. DPM is scalable, simple to implement, and introduces no bandwidth and practically no processing overhead on the network equipment. It is capable of tracing thousands of simultaneous attackers during a DDoS attack. Given sufficient deployment on the Internet, DPM is capable of tracing back to the slaves responsible for DDoS attacks that involve reflectors. In DPM, most of the processing required for traceback is done at the victim. The traceback process can be performed post-mortem allowing for tracing the attacks that may not have been noticed initially, or the attacks which would deny service to the victim so that traceback is impossible in real time. The involvement of the Internet Service Providers (ISPs) is very limited, and changes to the infrastructure and operation required to deploy DPM are minimal. DPM is capable of performing the traceback without revealing topology of the providers’ network, which is a desirable quality of a traceback method. 2006 Elsevier B.V. All rights reserved.
منابع مشابه
Accommodating fragmentation in deterministic packet marking for IP traceback
1 We propose a modification to the basic Deterministic Packet Marking (DPM), a promising IP traceback scheme, to handle fragmented traffic. The modification introduces no additional bandwidth overhead, but limited additional memory requirements and processing overhead on the DPM-enabled interface. Index Terms — Security, IP Traceback
متن کاملA Review of Packet Marking IP Traceback Schemes
Today, Internet has become the primary source of communication in networks. The attack on its infrastructure poses a great challenge in its expansion. Distributed Denial of Service attack is a serious security threat encountered during the past decade. The goal of the attacker is to spoof the source of IP address to hide its source. Various IP traceback schemes such as Probabilistic Packet Mark...
متن کاملInternet Deployment of DPM-based IP Traceback
1 In this article, we introduce the Internet deployment guidelines for Deterministic Packet Marking (DPM) – a novel IP traceback method. Unlike other packet marking schemes, DPM cannot be deployed sporadically on the Internet. Therefore, in order to perform the traceback, a structured way of deployment is needed. Related to topology and deployment issues, discussion comparing the features of ot...
متن کاملDynamic Detection and Protection Mechanism against Distributed Denial of Service Attacks using Fuzzy Logic
DDoS (Distributed Denial of Service) is the attack to pollute the network. The attacker creates a large amount of packet to the particular system. The packets are sending by using the compromised computers. It is an effort to make a device or network resource engaged to its intended users. This paper describes training the DDoS attack detection system to recognize possible attacks on a system. ...
متن کاملSWAPNILs PACKET MARKING AND TRACEBACKING (SPMT) TECHNIQUE FOR EFFICIENT IP TRACEBACK
There are many existing packet marking techniques [1] like probabilistic packet marking (PPM) [1][2][3[4], deterministic packet marking (DPM) [1][5][6], router-based approach (RBA)[7][8], and the like. In order for traceback mechanism to be competent in tracing, the mechanism should require minimum number of packets from the attacker to perform IP Traceback. A mechanism which takes minimum or f...
متن کاملSurvey on Packet Marking Algorithms for IP Traceback
Distributed Denial of Service (DDoS) attack is an unavoidable attack. Among various attacks on the network, DDoS attacks are difficult to detect because of IP spoofing. The IP traceback is the only technique to identify DDoS attacks. The path affected by DDoS attack is identified by IP traceback approaches like Probabilistic Packet marking algorithm (PPM) and Deterministic Packet Marking algori...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Networks
دوره 51 شماره
صفحات -
تاریخ انتشار 2007