IP Traceback Algorithm for DoS/DDoS Attack | SpringerLink
Skip to main content

IP Traceback Algorithm for DoS/DDoS Attack

  • Conference paper
Management of Convergence Networks and Services (APNOMS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4238))

Included in the following conference series:

Abstract

DoS(Denial of Service) / DDoS(Distributed Denial of Service) attacks threaten Internet security nowadays. However, the current Internet protocol and backbone network do not support traceback to know attacker’s real location. Many methods to defend DoS/DDoS attack have been proposed. However these kinds of methods cause network overhead because they use many packets to reconstruct an attack path. In this paper we propose effective probability marking methods and a pushback algorithm to reduce network overhead.

(This research was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Assessment) (IITA-2005-(C1090-0502-0020))).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Lee, H.C.J., Thing, V.L.L., Xu, Y., Ma, M.: ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 124–135. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Internet Protocol : Darpa Internet Program Protocol Specificatio, RFC791

    Google Scholar 

  3. Park, K., Lee, H.: On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. In: Proc. IEEE INFOCOM 2001, pp. 338–347 (2001)

    Google Scholar 

  4. Song, D.X., Perrig, A.: Advanced and Authenticated Marking Scheme for IP Traceback. In: Proc. infocom, vol. 2, pp. 878–886 (2001)

    Google Scholar 

  5. Kai, C., Xiaoxin, H., Ruibing, H.: DDoS Scouter: A Simple IP Traceback Scheme, http://blrc.edu.cn/blrcweb/publication/kc1.pdf

  6. Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical Network Support for IP Traceback. In: SIGCOMM (2000)

    Google Scholar 

  7. Stoica, I., Zhang, H.: Providing Guaranteed Services Without Per Flow Management. In: SIGCOMM (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yim, Hb., Jung, Ji. (2006). IP Traceback Algorithm for DoS/DDoS Attack. In: Kim, YT., Takano, M. (eds) Management of Convergence Networks and Services. APNOMS 2006. Lecture Notes in Computer Science, vol 4238. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11876601_65

Download citation

  • DOI: https://doi.org/10.1007/11876601_65

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-45776-3

  • Online ISBN: 978-3-540-46233-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics