An Improved Dynamic Probabilistic Packet Marking Algorithm

Full Text (PDF, 189KB), PP.25-30

Views: 0 Downloads: 0

Author(s)

Qiao Yan 1,* Xiaoming He 1 Tuwen Ning 1

1. Shenzhen University, Shenzhen, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2011.05.04

Received: 22 Jun. 2011 / Revised: 1 Aug. 2011 / Accepted: 5 Sep. 2011 / Published: 15 Oct. 2011

Index Terms

Distributed denial of service(DDoS), IP traceback, Dynamic Probabilistic Packet Marking(DPPM)

Abstract

An improved dynamic probabilistic packet marking algorithm named IDPPM is presented, which not only can reduce the marking overhead of routers near the attackers, but also can locate attack source rapidly and accurately. The challenge of weakest node and weakest link is solved with the price of a little more numbers of packets to reconstruct the attack path. Theoretical analysis and NS2 simulation demonstrate the effectiveness of the algorithm.

Cite This Paper

Qiao Yan,Xiaoming He,Tuwen Ning,"An Improved Dynamic Probabilistic Packet Marking Algorithm", IJWMT, vol.1, no.5, pp.23-30, 2011. DOI: 10.5815/ijwmt.2011.05.04 

Reference

[1]H. Burch, and B. Cheswick, "Tracing Anonymous Packets to Their Approximate source,"Proc. the 14th USENIX conference on System administration,USENIX Association Press, pp. 319-328,Jul. 2000

[2]S. Savage, D. Wetherall, and A. Karlin, "Network Support for IP Traceback," Proc. IEEE/ACM Transactions on Networking, IEEE Press, pp. 226-237, June 2001

[3]D. Song,and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," Proc. the IEEE INFOCOM, IEEE Press,pp. 878-886,2001

[4]F. Bo,G. Fan,and Y. Min, "Dynamic Probabilistic Packet Marking Based On PPM,"Proc. WMWA 09. Second Pacific-Asia Conference, pp. 289-292 ,June 2009

[5]L. Jenshiuh,L. Zhi-Jian,and C. Yeh-Ching, "Dynamic probabilistic packet marking for efficient IP traceback," Proc. the International Journal of Computer and Telecommunications Networking, Elsevier North-Holland Press,Feb 2007,pp. 866-882, doi: 10.1016

[6]G. Dapeng,Y. Shicai,and Y. Wenzhi, "Research on Composed Packet Marking for IP Traceback Algorithm,"Computer Engineering, Vol . 35, pp. 115-117 ,May 2009(In Chinese).

[7]A. Boneh,and M. Hofri, The Coupon Collector Problem Revisited Commun[J].Static Stochastic Models,pp. 39-66,1997

[8]K. Park,and H. Lee, "On the effectiveness of Probabilistic Packet Marking for IP Traceback under denial of service attack,"Proc. IEEE INFOCOM 2001, IEEE Press ,pp. 338-347,2001

[9]L. Stoica,and H. Zhang, "Providing Guaranteed Services Without Per Flow Management," Proc. the conference on Applications,technologies,architectures,and protocols for computer communication,ACM Press,pp. 81-94,1999

[10]D. Drew,F. Franklin, S. Adam, "An Algebraic Approach to IP Traceback," Proc. the ACM Transactions on Information and System Security, ACM Press ,pp. 119-137, May 2002

[11]V. Kuznetsov, A. Simkin,and H. Sandstom, "An evaluation of different IP traceback approaches,"Proc. the 4th International Conference on Information and Communications Security,pp. 37-48,2002