Tracing Anonymous Packets to their Sources: Based on Packet Marking

سال انتشار: 1384
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 1,087

فایل این مقاله در 8 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ACCSI11_252

تاریخ نمایه سازی: 5 آذر 1390

چکیده مقاله:

The design of the IP Protocol makes it difficult to reliably identify the originator of an IP Packet. The problem of identifying the source of network attacks such as Denial of Service (DoS) is among the hardest Internet Security area. A major issue hindering the ability to trace these attacks to their source is ease of IP address spoofing which conceals the attacker’s identity. In previous studies, several techniques generally naming IP Traceback have been proposed to trace IP Packets from destination to the source despite of IP Spoofing. In this paper, we present a Perimeter based IP Traceback System, which can trace the network anonymous packets and can be used by ISP’s or other network authorities to provide IP Traceback services to their customers. In contrast to previous work, our approach is highly scalable with low network and router overhead. In addition, our traceback scheme needs very little number of packets to identify the source(s) of anonymous packets. Our IP Traceback system is able to detect the spoofed packets with little increase in router processing. The proposed IP Traceback architecture can be easily extended to detect the single packet attacks.

کلیدواژه ها:

نویسندگان

Saeed Jalili

Tarbiat Modares University Tehran, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Ingress Filtering: Networkه [3] P. Ferguson and D. Senie, defeating ...
  • Computer Emergency Response Team. (January 3, 2000). CERT advisory CA-2000-01: ...
  • CNN. (October 28, 2002).FBI seeks to trace massive Net attack. ...
  • http ://www.cnn _ c O m /2002/TEC H/i nternet/ 1 ...
  • S. Savage, D. Wetherall, A. Karlin, and T. Anderson, support ...
  • C. Morrow and B Gemberling. How to attack a Do3 ...
  • D. Moore, G. M. Voelker, and S. Savage, "Inferring Internet ...
  • R. K. C. Chang, "Defending against flooding-based Distributed denial- of-service ...
  • D. X. Song and A. Perring, :Advanced and Authenticated marking ...
  • D. Dean Franklin and A. Stubblefield, : An Algebraic approach ...
  • T. W. Doeppner, P. N. Klein, and A. Koyfman, "Using ...
  • H. Ajifri, M. Smets and A. Pons, :IP Traceback using ...
  • W. Lee, and K. Park, _ the effectiveness of probabilistic ...
  • Z. Chen and M. Lee, _ IP traceback technique against ...
  • J. Gomes, F. Jin, and H. Choi, "Enhanced Probabilistic packet ...
  • A. Belenky and N. Ansari, :On IP Traceback, ; IEEE ...
  • S. M. Bellovin, "ICMP traceback messages, " IETF Draft, Oct. ...
  • Henry C.J.Lee, Vrizlynn L.L. Thing, Yi Xu, and Miao Ma, ...
  • A. Mankin, D. Massey, S. F. Wu, and L. Zhang, ...
  • Traceback, " Internet Draf. draft-wu- itrace- intention-00. txt, submitted Feb. ...
  • R. Stone, :CenterTrack An IP Overlay network for tracking DoS ...
  • A. C. Snoeren et al., "Single-packet IP Traceback, " in ...
  • S. Matsuda, T. Baba, A. Hayakawa, and T. Nakamara, "Design ...
  • T. Baba and S. Matsuda, "Tracing network to ther ...
  • sources, " IEEE Internet Comput., vol. 2, no. 6, pp. ...
  • H. Burch and) Cheswick, "Tracing anonymous packets to their approximate ...
  • H.Watanabe, T.Baba, S.Taketsume, and S.Matsuda. :A Study of packet identifier ...
  • S. J. Templeton and K. E. Levitt, "Detecting Spoofed Packets, ...
  • C. Shannon, D. Moore, and K. Claffy, "Characteristis of fragmented ...
  • نمایش کامل مراجع