Title :
Design and implementation of FDPM in network processor
Author :
Zeng, Kun ; Li, Zhongwen ; He, Shan
Author_Institution :
Kan Tah Kee Coll., Xiamen Univ., Xiamen, China
Abstract :
Notorious Distributed Denial of Service (DDoS) attacks consume a remote host or network resource to deny or degrade service to legitimate users. They have been identified as serious problems currently. Many mechanisms have been proposed to defend against DDoS attacks. IP traceback is a very important technology in these mechanisms. It provides the security system with the ability to identify the true source of the attacking IP packets. Flexible Deterministic Packet Marking (FDPM) is one of the IP traceback approaches. It only needs moderately a small number of packets to complete the IP traceback process. The implementation of FDPM in network processor demonstrates that FDPM is a good traceback method and the network processor can defend effectively against DDoS attacks.
Keywords :
IP networks; computer network security; IP traceback; attacking IP packets; distributed denial of service attacks; flexible deterministic packet marking; network processor; Computer crime; Encoding; IP networks; Protocols; Random access memory; Software; DDoS; FDPM; IP traceback; network processor; packet marking;
Conference_Titel :
Anti-Counterfeiting, Security and Identification (ASID), 2011 IEEE International Conference on
Conference_Location :
Xiamen
Print_ISBN :
978-1-61284-631-6
DOI :
10.1109/ASID.2011.5967434