Title :
TOPO: A Topology-aware Single Packet Attack Traceback Scheme
Author :
Zhang, Linfeng ; Guan, Yong
Author_Institution :
Dept. of Electr. & Comput. Eng., Iowa State Univ., Ames, IA
fDate :
Aug. 28 2006-Sept. 1 2006
Abstract :
With the phenomenal growth of the Internet, more and more people enjoy and depend on its provided services. Unfortunately, the number of network-based attacks is also increasing quickly. Network attackers can very easily hide their identities, and thereby reduce the chance of being captured and punished. Some attacks can even succeed by using only one or a few well-targeted packets. Therefore, it is desirable to design effective and efficient single packet IP traceback systems to attribute attackers. Several single packet IP traceback systems have been designed using Bloom filters. However, the inherent false positives of Bloom filters caused by unavoidable collisions restrain the effectiveness of these systems. To reduce the impact of unavoidable collisions in Bloom filters, we propose a topology-aware single packet IP traceback system, namely TOPO. We utilize the router´s local topology information, i.e., its immediate predecessor information. Our performance analysis shows that TOPO can reduce the number and scope of unnecessary queries, and significantly decrease false attributions. Furthermore, to improve the practicability of Bloom filter-based IP traceback systems, we design TOPO to allow partial deployment while maintaining its traceback capability. When Bloom filters are used, it is difficult to decide their optimal control parameters a priori. We design a k-adaptive mechanism which can dynamically adjust parameters of Bloom filters to reduce the false positive rate
Keywords :
IP networks; Internet; optimal control; telecommunication control; telecommunication network routing; telecommunication network topology; telecommunication security; Bloom filters; Internet; TOPO; k-adaptive mechanism; network-based attacks; optimal control parameters; router local topology information; single packet IP traceback systems; topology-aware single packet attack traceback scheme; Data structures; IP networks; Information filtering; Information filters; Optimal control; Performance analysis; Privacy; Telecommunication traffic; Topology; Web and internet services; Attack Attribution; Bloom Filter; IP Traceback; Network Security; Partial Deployment;
Conference_Titel :
Securecomm and Workshops, 2006
Conference_Location :
Baltimore, MD
Print_ISBN :
1-4244-0423-1
Electronic_ISBN :
1-4244-0423-1
DOI :
10.1109/SECCOMW.2006.359556