DocumentCode :
2742695
Title :
Security management with scalable distributed IP traceback
Author :
Siradjev, Djakhongir ; Yunusov, Laziz ; Kim, Young-Tak
Author_Institution :
Dept. of Inf. & Commun. Eng., Yeungnam Univ., Gyeongsan, South Korea
fYear :
2009
fDate :
1-5 June 2009
Firstpage :
598
Lastpage :
605
Abstract :
In this paper we propose an IP traceback mechanism based on deterministic packet marking and logging, using protected nodes set to reduce logged data amount. The proposed scheme exploits the fact that the number of nodes that may be under attack is usually limited to a small fraction of total nodes in the Internet, greatly reducing storage requirements by logging only the traffic destined to this fraction of nodes, thus meeting the hardware limitations of high speed core routers. Before logging at the traceback-enabled router every packet is checked whether it is destined to a host in the protected nodes set by using bloom filter. Protected nodes set and list of traceback-enabled routers is managed by security management infrastructure, which can be mirrored to avoid introduction of single point of failure. Maintaining the list of traceback-enabled routers allows performing neighbor discovery in the overlay network, which is required to detect faked identification field value in IP header by an attacker. By adding initialization stage and infrastructure the proposed scheme can provide constant complexity of per-packet processing and much longer bloom filter refresh period comparing to other approaches that use logging paradigm. Performance evaluation shows that the proposed IP traceback mechanism can be implemented in the real Internet with scalability and good deployment feasibility in terms of false positive ratio and memory usage.
Keywords :
IP networks; Internet; computer network management; telecommunication network routing; telecommunication security; telecommunication traffic; Internet traffic; bloom filter; deterministic data plane processing complexity; deterministic packet logging; deterministic packet marking; high speed core router; overlay network; scalable distributed IP traceback mechanism; security management; traceback-enabled router; Communication system operations and management; Data structures; Engineering management; Filters; Information security; Internet; Protection; Random access memory; Scalability; Upper bound; DDoS; IP traceback; Network security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Integrated Network Management, 2009. IM '09. IFIP/IEEE International Symposium on
Conference_Location :
Long Island, NY
Print_ISBN :
978-1-4244-3486-2
Electronic_ISBN :
978-1-4244-3487-9
Type :
conf
DOI :
10.1109/INM.2009.5188867
Filename :
5188867
Link To Document :
بازگشت