Design and Simulation Implementation of an Improved PPM Approach

Full Text (PDF, 198KB), PP.1-9

Views: 0 Downloads: 0

Author(s)

Guo Fan 1,* Feng Bo 1 Yu Min 1

1. Jiangxi Normal University, Nanchang, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2012.06.01

Received: 9 Aug. 2012 / Revised: 27 Sep. 2012 / Accepted: 7 Nov. 2012 / Published: 8 Dec. 2012

Index Terms

IP Traceback, DDOS, PPM, Network Security

Abstract

Different from recent probabilistic packet marking (PPM) methods, Dynamic PPM may solve many problems of traditional methods, such as loss of marking information, hard to reconstruct attack path, low accuracy, and so on. A novel DPPM approach is proposed and the network simulation software (NS2) is used to verify the performance and efficiency of the approach by constructing simulation DOS environments. In comparison with PPM methods, simulation results show that DPPM is much better.

Cite This Paper

Guo Fan,Feng Bo,Yu Min,"Design and Simulation Implementation of an Improved PPM Approach", IJWMT, vol.2, no.6, pp.1- 9, 2012. DOI: 10.5815/ijwmt.2012.06.01

Reference

[1]K. Park, H. Lee. ON the effectiveness of probabilistic packet marking for IP traceback. In : Proc. Of the IEEE Int'l Conf.on Communication 2004.2204.1008-1013.

[2]T. Baba, S. Matsuda TracingNetwork Attacks to Their Sources[J].IEEE Internet Computing,2002,16(2):20-26.

[3]R. Stone. Center Track: An IP Overlay Network for Tracking DoS Floods[A]. In :Proceedings of USENIX Security Symposium, 2000.

[4]P. Ferguson, D. Senie. Network Ingress Filtering:Defeating Denial of Service Attacks which EmployIP Source Address Spoofing(RFC2827) The Internet Society, 2000.

[5]R. Bajaj, P. Dharma. Improving Scheduling of Tasks in a HeterogeneousEnvironment[J]. IEEE Transactions,on Parallel and Distributed Systems, 2004, 15(2):107~118.

[6]S. Savage. Network Support for IP Traceback[J]. .IEEE ACM tractions on networking, 2001, 9:226-237.

[7]D.X. Song, A.Perrig. Advanced and authenticated marking schemes for IP traceback[C]. In: Proc of IEEE INFOCOM 2001, pp 878-886.

[8]H. Burch, B. Cheswick. Tracing Anonymous Pacekets to Their Approximate Source[C]. Proc of Usenix LISA,New Orleans.200-12:313-3.