Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014 (2014), Article ID 659894, 11 pages
http://dx.doi.org/10.1155/2014/659894
Research Article

Storage-Efficient 16-Bit Hybrid IP Traceback with Single Packet

Information and Computer Engineering, Chung Yuan Christian University, 200 Chung Pei Road, Chung Li City, Taoyuan County 32023, Taiwan

Received 12 May 2014; Revised 5 September 2014; Accepted 8 September 2014; Published 20 October 2014

Academic Editor: Marco Listanti

Copyright © 2014 Ming Hour Yang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Hussain, J. Heidemann, and C. Papadopoulos, “A framework for classifying denial of service attacks,” in Proceedings of the Conference on Computer Communications ACM (SIGCOMM '03), pp. 99–110, Karlsruhe, Germany, August 2003. View at Scopus
  2. CERT, IP Denial-of-Service Attacks, Software Engineering Institute, Carnegie Mellon University, 1997, http://www.cert.org/historical/advisories/CA-1997-28.cfm.
  3. A. Yaar, A. Perrig, and D. Song, “FIT: fast Internet traceback,” in Proceedings of the IEEE INFOCOM 2005, pp. 1395–1406, March 2005. View at Scopus
  4. D. X. Song and A. Perrig, “Advanced and authenticated marking schemes for IP traceback,” in Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 878–886, April 2001. View at Scopus
  5. H. Tian, J. Bi, X. Jiang, and W. Zhang, “A probabilistic marking scheme for fast traceback,” in Proceedings of the 2nd International Conference on Evolving Internet (INTERNET '10), pp. 137–141, Valcencia, Spain, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  6. J. Liu, Z.-J. Lee, and Y.-C. Chung, “Dynamic probabilistic packet marking for efficient IP traceback,” Computer Networks, vol. 51, no. 3, pp. 866–882, 2007. View at Publisher · View at Google Scholar · View at Scopus
  7. S. Savage, D. Wetherall, A. Karlin, and T. Anderson, “Network support for IP traceback,” IEEE/ACM Transactions on Networking, vol. 9, no. 3, pp. 226–237, 2001. View at Publisher · View at Google Scholar · View at Scopus
  8. V. Paruchuri, A. Durresi, and S. Chellappan, “TTL based packet marking for IP traceback,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '08), pp. 1–5, New Orleans, La, USA, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  9. S. Saurabh and A. S. Sairam, “Linear and remainder packet marking for fast IP traceback,” in Proceedings of the 4th International Conference on Communication Systems and Networks (COMSNETS '12), Bengaluru, India, January 2012. View at Publisher · View at Google Scholar · View at Scopus
  10. A. Belenky and N. Ansari, “Accommodating fragmentation in deterministic packet marking for IP traceback,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '03), pp. 1374–1378, December 2003. View at Scopus
  11. A. Belenky and N. Ansari, “IP traceback with deterministic packet marking,” IEEE Communications Letters, vol. 7, no. 4, pp. 162–164, 2003. View at Publisher · View at Google Scholar · View at Scopus
  12. A. Belenky and N. Ansari, “Tracing multiple attackers with deterministic packet marking (DPM),” in Proceedings of the IEEE Pacific Rim Conference on Communications, Computers and signal Processing (PACRIM '03), vol. 1, pp. 49–52, August 2003.
  13. V. K. Soundar Rajam and S. Mercy Shalinie, “A novel traceback algorithm for DDoS attack with marking scheme for online system,” in Proceedings of the International Conference on Recent Trends in Information Technology (ICRTIT '12), pp. 407–412, April 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. H. C. Tian, J. Bi, and P. Y. Xiao, “A flow-based traceback scheme on an AS-level overlay network,” in Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW '12), 2012.
  15. A. C. Snoeren, C. Partridge, L. A. Sanchez et al., “Single-packet IP traceback,” IEEE/ACM Transactions on Networking, vol. 10, no. 6, pp. 721–734, 2002. View at Publisher · View at Google Scholar · View at Scopus
  16. L. Zhang and Y. Guan, “TOPO: a topology-aware single packet attack traceback scheme,” in Proceedings of the IEEE International Conference on Security and Privacy in Communication Networks (SecureComm '06), pp. 1–10, September 2006. View at Publisher · View at Google Scholar · View at Scopus
  17. E. Hilgenstieler, E. P. Duarte Jr., G. Mansfield-Keeni, and N. Shiratori, “Extensions to the source path isolation engine for precise and efficient log-based IP traceback,” Computers and Security, vol. 29, no. 4, pp. 383–392, 2010. View at Publisher · View at Google Scholar · View at Scopus
  18. B. H. Bloom, “Space/time trade-offs in hash coding with allowable errors,” Communications of the ACM, vol. 13, no. 7, pp. 422–426, 1970. View at Publisher · View at Google Scholar · View at Scopus
  19. C. Gong and K. Sarac, “A more practical approach for single-packet IP traceback using packet logging and marking,” IEEE Transactions on Parallel and Distributed Systems, vol. 19, no. 10, pp. 1310–1324, 2008. View at Publisher · View at Google Scholar · View at Scopus
  20. K. H. Choi and H. K. Dai, “A marking scheme using huffman codes for IP traceback,” in Proceedings on the 7th International Symposium on Parallel Architectures, Algorithms and Networks (I-SPAN '04), pp. 421–428, May 2004. View at Publisher · View at Google Scholar · View at Scopus
  21. S. Malliga and A. Tamilarasi, “A hybrid scheme using packet marking and logging for IP traceback,” International Journal of Internet Protocol Technology, vol. 5, no. 1-2, pp. 81–91, 2010. View at Publisher · View at Google Scholar · View at Scopus
  22. S. Malliga and A. Tamilarasi, “A proposal for new marking scheme with its performance evaluation for IP traceback,” WSEAS Transactions on Computer Research, vol. 3, no. 4, pp. 259–272, 2008. View at Google Scholar · View at Scopus
  23. Y. L. Wang, S. Su, Y. Yang, and J. Ren, “A more efficient hybrid approach for single-packet IP traceback,” in Proceedings of the 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP '12), pp. 275–282, Garching, Germany, February 2012. View at Publisher · View at Google Scholar · View at Scopus
  24. M. H. Yang and M. C. Yang, “RIHT: a novel hybrid IP traceback scheme,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 789–797, 2012. View at Publisher · View at Google Scholar · View at Scopus
  25. N. Lu, Y. Wang, F. Yang, and M. Xu, “A novel approach for single-packet IP traceback based on routing path,” in Proceedings of the 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP '12), pp. 253–260, February 2012. View at Publisher · View at Google Scholar · View at Scopus
  26. M. H. Yang, “Hybrid single-packet IP traceback with low storage and high accuracy,” The Scientific World Journal, vol. 2014, Article ID 239280, 12 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  27. W. John and S. Tafvelln, “Analysis of internet backbone traffic and header anomalies observed,” in Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference (IMC '07), pp. 111–116, October 2007. View at Publisher · View at Google Scholar · View at Scopus
  28. “Security assessment of the internet protocol version 4,” IETF RFC 6274, Internet Engineering Task Force (IETF), 2011.
  29. CAIDA, “CAIDA’s skitter project,” http://www.caida.org/tools/skitter/.