Title :
Security management with scalable distributed IP traceback
Author :
Siradjev, Djakhongir ; Yunusov, Laziz ; Kim, Young-Tak
Author_Institution :
Dept. of Inf. & Commun. Eng., Yeungnam Univ., Gyeongsan, South Korea
Abstract :
In this paper we propose an IP traceback mechanism based on deterministic packet marking and logging, using protected nodes set to reduce logged data amount. The proposed scheme exploits the fact that the number of nodes that may be under attack is usually limited to a small fraction of total nodes in the Internet, greatly reducing storage requirements by logging only the traffic destined to this fraction of nodes, thus meeting the hardware limitations of high speed core routers. Before logging at the traceback-enabled router every packet is checked whether it is destined to a host in the protected nodes set by using bloom filter. Protected nodes set and list of traceback-enabled routers is managed by security management infrastructure, which can be mirrored to avoid introduction of single point of failure. Maintaining the list of traceback-enabled routers allows performing neighbor discovery in the overlay network, which is required to detect faked identification field value in IP header by an attacker. By adding initialization stage and infrastructure the proposed scheme can provide constant complexity of per-packet processing and much longer bloom filter refresh period comparing to other approaches that use logging paradigm. Performance evaluation shows that the proposed IP traceback mechanism can be implemented in the real Internet with scalability and good deployment feasibility in terms of false positive ratio and memory usage.
Keywords :
IP networks; Internet; computer network management; telecommunication network routing; telecommunication security; telecommunication traffic; Internet traffic; bloom filter; deterministic data plane processing complexity; deterministic packet logging; deterministic packet marking; high speed core router; overlay network; scalable distributed IP traceback mechanism; security management; traceback-enabled router; Communication system operations and management; Data structures; Engineering management; Filters; Information security; Internet; Protection; Random access memory; Scalability; Upper bound; DDoS; IP traceback; Network security;
Conference_Titel :
Integrated Network Management, 2009. IM '09. IFIP/IEEE International Symposium on
Conference_Location :
Long Island, NY
Print_ISBN :
978-1-4244-3486-2
Electronic_ISBN :
978-1-4244-3487-9
DOI :
10.1109/INM.2009.5188867