Abstract
IP traceback is an important task in Internet security area. Techniques have been developed to deploy in pure IP network, but, to date, no system has been presented to use the facility of MPLS in MPLS-enabled network. We present Overlay Logging, a technique combines the hash based logging (SPIE) and the convenience of setup overlay network in MPLS network. Our system can achieve a relatively lower false positive rate than SPIE, needs less hardware investment, and reduces the storage pressure. It is impervious to multi-path routing in the network. What’s more, the network overhead and configuration cost of our system is low.
Supported by: (1) the National Natural Science Foundation of China (No. 60473082 & No. 90104002 & No. 60373010); (2) the National Grand Fundamental Research 973 Program of China (No. 2003CB314801).
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Chang, R.K.C.: Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial. IEEE Commun. Mag., 42–51 (October 2002)
CERT Advisory CA-2000-01 Denial-of-service developments, [Online]. Available (January 2000), http://www.cert.org/advisories/CA-2000-01.html
Sekar, R., Guang, Y., Verma, S., Shanbhag, T.: A High-Performance Network Intrusion Detection System. In: Proceedings of the 6th ACM conference on Computer and communications security, pp. 8–17 (1999)
Belenky, A., Ansari, N.: On IP traceback. IEEE Communications Magazine 41(7), 142–153 (2003)
Snoeren, A.C., Partridge, C., Sanchez, L.A., Jones, C.E., Tchakountio, F., Schwartz, B., Kent, S.T., Strayers, W.T.: Single-Packet IP Traceback. IEEE/ACM Transactions on Networking 10(6), 721–734 (2002)
Lee, T.-H., Wu, W.-K., Huang, T.-Y.W.: Scalable packet digesting schemes for IP traceback. In: 2004 IEEE International Conference on Communications, June 20-24, vol. 2, pp. 1008–1013 (2004)
Li, J., Sung, M., Xu, J., Li, L.: Large-scale IP traceback in high-speed internet: practical techniques and theoretical foundation. In: 2004 IEEE Symposium on Security and Privacy, Proceedings, May 9-12, pp. 115–129 (2004)
Stone, R.: Centertrack: An IP Overlay Network for Tracking DoS Floods. In: Proc. 9th USENIX Sec. Symp., pp. 199–212 (2000)
Savage, S., et al.: Network Support for IP Traceback. IEEE/ACM Trans. Net. 9(3), 226–237 (2001)
Song, D.X., Perrig, A.: Advanced and Authenticated Marking Schemes for IP Traceback. In: Proc. INFOCOM, vol. 2, pp. 878–886 (2001)
Rosen, E., Viswanathan, A., Callon, R.: Multiprotocol Label Switching Architecture, RFC3031 (January 2001)
Belenky, A., Ansari, N.: IP traceback with deterministic packet marking. IEEE Communications Letters 7(4), 162–164 (2003)
Park, K., Lee, H.: On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. In: INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, Proceedings, April 22-26, vol. 1, pp. 338–347. IEEE, Los Alamitos (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wen, L., Jianping, W., Ke, X. (2005). Overlay Logging: An IP Traceback Scheme in MPLS Network. In: Lorenz, P., Dini, P. (eds) Networking - ICN 2005. ICN 2005. Lecture Notes in Computer Science, vol 3421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31957-3_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-31957-3_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25338-9
Online ISBN: 978-3-540-31957-3
eBook Packages: Computer ScienceComputer Science (R0)