Title :
A Novel Two-Step Traceback Scheme for DDoS Attacks
Author :
Qu, Zhaoyang ; Huang, Chunfeng ; Liu, Ningning
Author_Institution :
Sch. of Inf. Eng., Northeast Dianli Univ., Jilin
Abstract :
The defense against Distributed Denial of Service (DDoS) attacks is one of the primary concerns on the Internet today. IP spoofing makes it difficult for the victim to determine the packet´s true origin. There is a need for a mechanism that could rapidly trace back to the attacks´ origins for the victim. This paper presents a two-step traceback scheme to track DDoS attack source by dividing the tracing process into two steps. In the first step, packet marking method based on autonomous system (ASPMM) is adopted to determine the attack-originating autonomous system (AS). In the second step, non-repeated probabilistic packet marking (NRPPM) is used to identify the exact origin of the attacks in the specific AS. Compared with previous algorithms, the two-step traceback scheme has the benefits of low bandwidth consumption, quick convergence speed, light computational overhead of address recombination, it can decrease the number of packets the path reconstruction needs, and improve the efficiency of path reconstruction, hence making it possible to trace the DDoS attack source rapidly.
Keywords :
IP networks; Internet; probability; security of data; DDoS; IP spoofing; Internet; autonomous system; distributed denial of service attacks; non-repeated probabilistic packet marking; packet marking method; path reconstruction; two-step traceback scheme; Bandwidth; Cities and towns; Computer crime; Convergence; Encoding; Information technology; Mechanical engineering; Power engineering and energy; Routing; Web and internet services; AS; DDoS Attack; IP Traceback; Network Security; Packet Marking;
Conference_Titel :
Intelligent Information Technology Application, 2008. IITA '08. Second International Symposium on
Conference_Location :
Shanghai
Print_ISBN :
978-0-7695-3497-8
DOI :
10.1109/IITA.2008.102