skip to main content
10.1145/1711113.1711118acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaintecConference Proceedingsconference-collections
research-article

A theoretical approach to parameter value selection of probabilistic packet marking for IP traceback

Published:18 November 2009Publication History

ABSTRACT

We study the performance of the fragment-marking-based probabilistic packet marking (PPM) for the IP traceback. In the fragment-marking-based PPM, each router splits its IP-address or its hash value into multiple fragments and, in the case of marking, it randomly chooses one of fragments to write into the Identification field of a packet to forward. In the fragment marking, the Identification field is partitioned into three small fields; a bid-bit field (fragment-ID field) storing the index of fragments, a bd-bit field (distance field) storing the hop distance between the victim to the marking router, and a (16 -- bid -- bd)-bit field (fragment field) storing a fragment. In this paper, we theoretically investigate the dependence of the performance of the fragment-marking-based PPM on parameters including bid and bd. In particular, we derive explicit representations of the false positive and negative ratios of the fragment marking, which are expressed by bd, bid, and some other parameters. Based on the derived representations, we study how to select parameter values to have better performance of the fragment marking.

References

  1. M. Adler. Trade-offs in probabilistic packet marking. Journal of the ACM, 52(2):217--244, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Adler, J. Edmons, and J. Matousek. Towards asymptotic optimality in probabilistic packet marking. In Proceedings of the ACM Symposium on Theory of Computing, pages 450--459, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. H. Burch and B. Cheswick. Tracing anonymous packets to their approximate source. In Proceedings of the Usenix, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Dean and M. Franklin. An algebraic approach to IP traceback. ACM Transactions on Information and System Security, 5:119--137, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. W. Feller. An Introduction to Probability Theory and Its Applications, 2nd ed., volume 1. New York: Wiley, 1966.Google ScholarGoogle Scholar
  6. M. Goodrich. Efficient packet marking for large-scale IP traceback. In Proceedings of the 9th ACM Conference on Computer and Communication Security, pages 117--126, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. Moore, G. Voelker, and S. Savage. Inferring Internet denial-of-service activity. In Proceedings of the Usenix Security Symposium, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. K. Park and H. Lee. On the effectiveness of probabilistic packet marking for IP traceback under Denial of Service attack. IEEE INFOCOM, 2001.Google ScholarGoogle Scholar
  9. A. Savage, D. Wetherall, A. Karlin, and T. Anderson. Network support for IP traceback. IEEE/ACM Trans. Networking, 9(3):226--237, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Shioda. Some upper and lower bounds on the coupon collector problem. Journal of Computational and Applied Mathematics, 200(1):154--167, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Song and A. Perrig. Advanced and authenticated techniques for IP traceback. IEEE INFOCOM, 2001.Google ScholarGoogle Scholar
  12. A. Yaar, A. Perrig, and D. Song. FIT: Fast Internet traceback. IEEE INFOCOM, 2005.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A theoretical approach to parameter value selection of probabilistic packet marking for IP traceback

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          AINTEC '09: Proceedings of the 4th Asian Internet Engineering Conference
          November 2009
          99 pages
          ISBN:9781605586144
          DOI:10.1145/1711113

          Copyright © 2009 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 18 November 2009

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate15of38submissions,39%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader