skip to main content
article

Probabilistic packet marking for large-scale IP traceback

Published: 01 February 2008 Publication History

Abstract

This paper presents an approach to IP traceback based on the probabilistic packet marking paradigm. Our approach, which we call randomize-and-link, uses large checksum cords to "link" message fragments in a way that is highly scalable, for the checksums serve both as associative addresses and data integrity verifiers. The main advantage of these checksum cords is that they spread the addresses of possible router messages across a spectrum that is too large for the attacker to easily create messages that collide with legitimate messages.

References

[1]
{1} A. Anagnostopoulos, M. T. Goodrich, and R. Tamassia, "Persistent authenticated dictionaries and their applications," in Proc. Information Security Conf. (ISC 2001), 2001, vol. LNCS 2200, pp. 379-393, Springer-Verlag.
[2]
{2} T. Baba and S. Matsuda, "Tracing network attacks to their sources," IEEE Internet Computing, vol. 6, no. 2, pp. 20-26, 2002.
[3]
{3} S. M. Bellovin, "ICMP traceback messages," work in Progress, Internet Draft draft-bellovin-itrace-00.txt, Mar. 2000.
[4]
{4} H. Burch and B. Cheswick, "Tracing anonymous packets to their approximate source," in Proc. Usenix LISA (New Orleans) Conf., 2000, pp. 313-322.
[5]
{5} D. Dean, M. Franklin, and A. Stubblefield, "An algebraic approach to IP traceback," in Proc. Network and Distributed System Security Symp. (NDSS), 2001, pp. 3-12.
[6]
{6} M. T. Goodrich, "Efficient packet marking for large-scale IP traceback," in Proc. 9th ACM Conf. Computer and Communications Security (CCS), 2002, pp. 117-126.
[7]
{7} M. T. Goodrich, R. Tamassia, and A. Schwerin, "Implementation of an authenticated dictionary with skip lists and commutative hashing," in Proc. 2001 DARPA Information Survivability Conf. Expo., 2001, vol. 2, pp. 68-82.
[8]
{8} J. Ioannidis and S. M. Bellovin, "Implementing Pushback: Router-based defense against DDOS attacks," in Proc. Network and Distributed System Security Symp., 2002.
[9]
{9} T. K. T. Law, D. K. Y. Yau, and J. C. S. Lui, "You can run, but you can't hide: An effective statistical methodology to trace back DDOS attackers," IEEE Trans. Parallel Distrib. Syst., vol. 16, no. 9, pp. 799-813, Sep. 2005.
[10]
{10} R. Motwani and P. Raghavan, Randomized Algorithms. New York: Cambridge Univ. Press, 1995.
[11]
{11} S. Savage, D. Wetherall, A. R. Karlin, and T. Anderson, "Practical network support for IP traceback," in Proc. ACM SIGCOMM, 2000, pp. 295-306.
[12]
{12} A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent, and W. T. Strayer, "Hash-based IP traceback," in Proc. ACM SIGCOMM 2001 Conf. Applications, Technologies, Architectures, and Protocols for Computer Communication, San Diego, CA, 2001.
[13]
{13} D. Song and A. Perrig, "Advanced and authenticated marking schemes for IP traceback," in Proc. IEEE INFOCOM, 2001, pp. 878-886.
[14]
{14} R. Stone, "Centertrack: An IP overlay network for tracking DoS floods," in Proc. 9th USENIX Security Symp., Denver, CO, Aug. 2000.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE/ACM Transactions on Networking
IEEE/ACM Transactions on Networking  Volume 16, Issue 1
February 2008
245 pages

Publisher

IEEE Press

Publication History

Published: 01 February 2008
Published in TON Volume 16, Issue 1

Author Tags

  1. IP
  2. associate addresses
  3. checksum cords
  4. denial of service (DDOS)
  5. distributed
  6. probabilistic packet marking
  7. traceback

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Jäger: Automated Telephone Call TracebackProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690290(2042-2056)Online publication date: 2-Dec-2024
  • (2022)Secure and ultra-reliable provenance recovery in sparse networksAd Hoc Networks10.1016/j.adhoc.2022.102860131:COnline publication date: 1-Jun-2022
  • (2021)ICSTraceSecurity and Communication Networks10.1155/2021/75250922021Online publication date: 1-Jan-2021
  • (2021)An SDN-Assisted Defense Mechanism for the Shrew DDoS Attack in a Cloud Computing EnvironmentJournal of Network and Systems Management10.1007/s10922-020-09580-729:2Online publication date: 1-Apr-2021
  • (2018)Cluster-Based Arithmetic Coding for Data Provenance Compression in Wireless Sensor NetworksWireless Communications & Mobile Computing10.1155/2018/95769782018Online publication date: 27-Jun-2018
  • (2018)SENSS Against Volumetric DDoS AttacksProceedings of the 34th Annual Computer Security Applications Conference10.1145/3274694.3274717(266-277)Online publication date: 3-Dec-2018
  • (2018)Record route IP tracebackComputers and Security10.1016/j.cose.2017.08.01272:C(13-25)Online publication date: 1-Jan-2018
  • (2017)A learning-based hybrid framework for detection and defence of DDoS attacksInternational Journal of Internet Protocol Technology10.1504/IJIPT.2017.08303610:1(51-60)Online publication date: 1-Jan-2017
  • (2017)FACTIEEE Transactions on Information Forensics and Security10.1109/TIFS.2016.262474112:3(604-616)Online publication date: 1-Mar-2017
  • (2016)Opportunistic Piggyback Marking for IP TracebackIEEE Transactions on Information Forensics and Security10.1109/TIFS.2015.249129911:2(273-288)Online publication date: 1-Feb-2016
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media