Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 239280, 12 pages
http://dx.doi.org/10.1155/2014/239280
Research Article

Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy

Department of Information and Computer Science, Chung Yuan Christian University, No. 200, Chung Pei Road, Chung Li City, Taoyuan County 32023, Taiwan

Received 25 September 2013; Accepted 30 December 2013; Published 23 February 2014

Academic Editors: Y. Huang and Y. Qi

Copyright © 2014 Ming Hour Yang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Hussain, J. Heidemann, and C. Papadopoulos, “A Framework for classifying denial of service attacks,” in Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '03), pp. 99–110, ACM, Karlsruhe, Germany, August 2003. View at Scopus
  2. A. Yaar, A. Perrig, and D. Song, “FIT: fast internet traceback,” in Proceedings of the IEEE Annual International Conference on Computer Communications (INFOCOM '05), vol. 2, pp. 1395–1406, March 2005. View at Scopus
  3. D. X. Song and A. Perrig, “Advanced and authenticated marking schemes for IP traceback,” in Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '01), vol. 2, pp. 878–886, April 2001. View at Scopus
  4. H. C. Tian, J. Bi, X.-K. Jiang, and W. Zhang, “A probabilistic marking scheme for fast traceback,” in Proceedings of the 2nd International Conference on Evolving Internet (Internet '10), pp. 137–141, IEEE Computer Society, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. J. S. Liu, Z.-J. Lee, and Y.-C. Chung, “Dynamic probabilistic packet marking for efficient IP traceback,” Computer Networks, vol. 51, no. 3, pp. 866–882, 2007. View at Publisher · View at Google Scholar · View at Scopus
  6. S. Savage, D. Wetherall, A. Karlin, and T. Anderson, “Network support for IP traceback,” IEEE/ACM Transactions on Networking, vol. 9, no. 3, pp. 226–237, 2001. View at Publisher · View at Google Scholar · View at Scopus
  7. V. Paruchuri, A. Durresi, and S. Chellappan, “TTL based packet marking for IP traceback,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '08), pp. 1–5, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  8. A. Belenky and N. Ansari, “Accommodating fragmentation in deterministic packet marking for IP traceback,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '03), vol. 3, pp. 1374–1378, December 2003. View at Scopus
  9. A. Belenky and N. Ansari, “IP traceback with deterministic packet marking,” IEEE Communications Letters, vol. 7, no. 4, pp. 162–164, 2003. View at Publisher · View at Google Scholar · View at Scopus
  10. A. Belenky and N. Ansari, “Tracing multiple attackers with deterministic packet marking (DPM),” in Proceedings of the IEEE Pacific Rim Conference on Communications Computers and Signal Processing (PACRIM '03), vol. 1, pp. 49–52, August 2003. View at Scopus
  11. A. C. Snoeren, C. Partridge, L. A. Sanchez et al., “Single-packet IP traceback,” IEEE/ACM Transactions on Networking, vol. 10, no. 6, pp. 721–734, 2002. View at Publisher · View at Google Scholar · View at Scopus
  12. B. H. Bloom, “Space/time trade-offs in hash coding with allowable errors,” Communications of the ACM, vol. 13, no. 7, pp. 422–426, 1970. View at Publisher · View at Google Scholar · View at Scopus
  13. L. Zhang and Y. Guan, “TOPO: a topology-aware single packet attack traceback scheme,” in Proceedings of the IEEE International Conference on Security and Privacy in Communication Networks (SecureComm '06), pp. 1–10, September 2006. View at Publisher · View at Google Scholar · View at Scopus
  14. C. Gong and K. Sarac, “A more practical approach for single-packet IP traceback using packet logging and marking,” IEEE Transactions on Parallel and Distributed Systems, vol. 19, no. 10, pp. 1310–1324, 2008. View at Publisher · View at Google Scholar · View at Scopus
  15. K. H. Choi and H. K. Dai, “A marking scheme using Huffman codes for IP traceback,” in Proceedings of the 7th International Symposium on Parallel Architectures, Algorithms and Networks (SPAN’04), pp. 421–428, May 2004. View at Publisher · View at Google Scholar · View at Scopus
  16. S. Malliga and A. Tamilarasi, “A hybrid scheme using packet marking and logging for IP traceback,” International Journal of Internet Protocol Technology, vol. 5, no. 1-2, pp. 81–91, 2010. View at Publisher · View at Google Scholar · View at Scopus
  17. S. Malliga and A. Tamilarasi, “A proposal for new marking scheme with its performance evaluation for IP traceback,” WSEAS Transactions on Computer Research, vol. 3, no. 4, pp. 259–272, 2008. View at Google Scholar · View at Scopus
  18. M.-H. Yang and M.-C. Yang, “RIHT: a novel hybrid IP traceback scheme,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 789–797, 2012. View at Publisher · View at Google Scholar · View at Scopus
  19. CAIDA, “CAIDA’s skitter project,” 2010, http://www.caida.org/tools/skitter/.
  20. W. John and S. Tafvelln, “Analysis of internet backbone traffic and header anomalies observed,” in Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement (IMC’07), pp. 111–116, October 2007. View at Publisher · View at Google Scholar · View at Scopus
  21. “Security Assessment of the Internet Protocol,” Version 4, IETF RFC 6274, 2011.
  22. D. E. Knuth, The Art of Computer Programming, Volume 3: Sorting and Searching, Addison Wesley Longman, Redwood City, Calif, USA, 2nd edition, 1998.