Novel hybrid schemes employing packet marking and logging for IP traceback

Tracing DoS attacks that employ source address spoofing is an important and challenging problem. Traditional traceback schemes provide spoofed packets traceback capability either by augmenting the packets with partial path information (i.e., packet marking) or by storing packet digests or signatures...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on parallel and distributed systems Vol. 17; no. 5; pp. 403 - 418
Main Authors Al-Duwairi, B., Govindarasu, M.
Format Journal Article
LanguageEnglish
Published New York IEEE 01.05.2006
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Tracing DoS attacks that employ source address spoofing is an important and challenging problem. Traditional traceback schemes provide spoofed packets traceback capability either by augmenting the packets with partial path information (i.e., packet marking) or by storing packet digests or signatures at intermediate routers (i.e., packet logging). Such approaches require either a large number of attack packets to be collected by the victim to infer the paths (packet marking) or a significant amount of resources to be reserved at intermediate routers (packet logging). We adopt a hybrid traceback approach in which packet marking and packet logging are integrated in a novel manner, so as to achieve the best of both worlds, that is, to achieve a small number of attack packets to conduct the traceback process and a small amount of resources to be allocated at intermediate routers for packet logging purposes. Based on this notion, two novel traceback schemes are presented. The first scheme, called distributed link-list traceback (DLLT), is based on the idea of preserving the marking information at intermediate routers in such a way that it can be collected using a link list-based approach. The second scheme, called probabilistic pipelined packet marking (PPPM), employs the concept of a "pipeline" for propagating marking information from one marking router to another so that it eventually reaches the destination. We evaluate the effectiveness of the proposed schemes against various performance metrics through a combination of analytical and simulation studies. Our studies show that the proposed schemes offer a drastic reduction in the number of packets required to conduct the traceback process and a reasonable saving in the storage requirement.
AbstractList Tracing DoS attacks that employ source address spoofing is an important and challenging problem. Traditional traceback schemes provide spoofed packets traceback capability either by augmenting the packets with partial path information (i.e., packet marking) or by storing packet digests or signatures at intermediate routers (i.e., packet logging). Such approaches require either a large number of attack packets to be collected by the victim to infer the paths (packet marking) or a significant amount of resources to be reserved at intermediate routers (packet logging). We adopt a hybrid traceback approach in which packet marking and packet logging are integrated in a novel manner, so as to achieve the best of both worlds, that is, to achieve a small number of attack packets to conduct the traceback process and a small amount of resources to be allocated at intermediate routers for packet logging purposes. Based on this notion, two novel traceback schemes are presented. The first scheme, called distributed link-list traceback (DLLT), is based on the idea of preserving the marking information at intermediate routers in such a way that it can be collected using a link list-based approach. The second scheme, called probabilistic pipelined packet marking (PPPM), employs the concept of a "pipeline" for propagating marking information from one marking router to another so that it eventually reaches the destination. We evaluate the effectiveness of the proposed schemes against various performance metrics through a combination of analytical and simulation studies. Our studies show that the proposed schemes offer a drastic reduction in the number of packets required to conduct the traceback process and a reasonable saving in the storage requirement.
Traditional traceback schemes provide spoofed packets traceback capability either by augmenting the packets with partial path information (i.e., packet marking) or by storing packet digests or signatures at intermediate routers (i.e., packet logging).
Author Govindarasu, M.
Al-Duwairi, B.
Author_xml – sequence: 1
  givenname: B.
  surname: Al-Duwairi
  fullname: Al-Duwairi, B.
  organization: Dept. of Comput. Eng., Jordan Univ. of Sci. & Technol., Irbid, Jordan
– sequence: 2
  givenname: M.
  surname: Govindarasu
  fullname: Govindarasu, M.
BookMark eNp90c9LHDEUB_AgCl1Xb715GXrQS2d9efkxyVHUtsqiQu05ZDLZ3dHZyZrMFva_b4YtFIR6ygt8XiDf7zE57EPvCflMYUYp6Mvnp5ufMwSQM8kOyIQKoUqkih3mGbgoNVL9iRyn9AJAuQA-IfcP4bfvitWujm1TJLfya58Kv950Ydf2y2Jj3asfirWNr-PV9k3RheVynBchFndPxRCt83VmJ-RoYbvkT_-eU_Lr2-3z9Y9y_vj97vpqXjrGxVBa68CyBec1A85qRMUbKSvUoDyvK6wogpaVbhAbTRsmBKsYOJTUKWexZlNysX93E8Pb1qfBrNvkfNfZ3odtMkpLqlmOIcvzDyUqQK2oyPDLO_gStrHPvzCaIoJENiLcIxdDStEvjGsHO7ShzxG0naFgxhbM2IIZWzCS5aWv75Y2sc1p7v7Hz_a89d7_o5IyJYD9AcZekNU
CODEN ITDSEO
CitedBy_id crossref_primary_10_1109_TIFS_2016_2624741
crossref_primary_10_1080_2333696X_2008_10855850
crossref_primary_10_1109_TIFS_2011_2169960
crossref_primary_10_1371_journal_pone_0160375
crossref_primary_10_1109_TIFS_2014_2381873
crossref_primary_10_1007_s13119_012_0007_x
crossref_primary_10_1016_j_adhoc_2009_07_002
crossref_primary_10_1016_j_cose_2017_08_012
crossref_primary_10_1109_SURV_2013_031413_00127
crossref_primary_10_1587_transcom_E96_B_1896
crossref_primary_10_1002_sec_725
crossref_primary_10_1016_j_fsidi_2019_200892
crossref_primary_10_1109_TC_2015_2439287
crossref_primary_10_1109_TPDS_2008_132
crossref_primary_10_1007_s11277_020_07546_1
crossref_primary_10_1109_TPDS_2007_70817
crossref_primary_10_1016_j_comnet_2018_07_013
crossref_primary_10_1002_sec_1554
crossref_primary_10_1587_transinf_E94_D_2077
crossref_primary_10_1109_TIFS_2015_2491299
crossref_primary_10_1016_j_cose_2015_06_007
crossref_primary_10_1016_j_cose_2019_04_017
crossref_primary_10_1002_dac_4382
crossref_primary_10_1109_TPDS_2010_97
Cites_doi 10.1145/505586.505588
10.1145/863965.863968
10.1145/964723.383060
10.1145/362686.362692
10.1109/infcom.2001.916279
10.1109/ICCCN.2004.1401609
10.1109/ICDCS.2003.1203482
10.1145/347057.347560
10.21236/ADA400003
10.1109/CSFW.1999.779758
10.1145/586110.586128
10.1109/infcom.2001.916716
10.1109/TPDS.2003.1233709
10.1109/4236.991439
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2006
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2006
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
DOI 10.1109/TPDS.2006.63
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
Engineering Research Database
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList
Technology Research Database
Technology Research Database
Computer and Information Systems Abstracts
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1558-2183
EndPage 418
ExternalDocumentID 2544607371
10_1109_TPDS_2006_63
1613850
Genre orig-research
GroupedDBID --Z
-~X
.DC
0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABFSI
ABQJQ
ABVLG
ACGFO
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
E.L
EBS
EJD
HZ~
H~9
ICLAB
IEDLZ
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNI
RNS
RZB
TN5
TWZ
UHB
VH1
AAYXX
CITATION
RIG
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
ID FETCH-LOGICAL-c345t-aac0a3f44b3043b2284d6672908e4b7271209679d22d91d3553730c261c8ca2b3
IEDL.DBID RIE
ISSN 1045-9219
IngestDate Fri Jul 11 09:48:48 EDT 2025
Thu Jul 10 23:10:10 EDT 2025
Sun Jun 29 12:30:14 EDT 2025
Tue Aug 05 12:04:38 EDT 2025
Thu Apr 24 23:09:36 EDT 2025
Wed Aug 27 02:52:30 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 5
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c345t-aac0a3f44b3043b2284d6672908e4b7271209679d22d91d3553730c261c8ca2b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
PQID 912206235
PQPubID 23500
PageCount 16
ParticipantIDs proquest_miscellaneous_896193200
crossref_citationtrail_10_1109_TPDS_2006_63
proquest_miscellaneous_28029815
crossref_primary_10_1109_TPDS_2006_63
ieee_primary_1613850
proquest_journals_912206235
PublicationCentury 2000
PublicationDate 2006-05-01
PublicationDateYYYYMMDD 2006-05-01
PublicationDate_xml – month: 05
  year: 2006
  text: 2006-05-01
  day: 01
PublicationDecade 2000
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on parallel and distributed systems
PublicationTitleAbbrev TPDS
PublicationYear 2006
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
Bellovin (ref16) 2000
ref15
ref14
ref20
Mankin (ref10)
ref2
ref1
Burch (ref4)
Stone (ref18)
ref17
McGuire (ref11) 2002
ref19
ref8
ref7
ref9
ref3
ref6
Daniels (ref5) 2002
References_xml – ident: ref6
  doi: 10.1145/505586.505588
– ident: ref8
  doi: 10.1145/863965.863968
– volume-title: Proc. Ninth USENIX Security Symp.
  ident: ref18
  article-title: Centertrack: An IP Overlay Network for Tracking DoS Floods
– ident: ref19
  doi: 10.1145/964723.383060
– start-page: 319
  volume-title: Proc. 2000 USENIX LISA Conf.
  ident: ref4
  article-title: Tracing Anonymous Packets to Their Approximate Source
– ident: ref3
  doi: 10.1145/362686.362692
– ident: ref17
  doi: 10.1109/infcom.2001.916279
– ident: ref1
  doi: 10.1109/ICCCN.2004.1401609
– year: 2002
  ident: ref5
  article-title: Reference Models for the Concealment and Observation of Origin Identity in Store-and-Forward Networks
– ident: ref7
  doi: 10.1109/ICDCS.2003.1203482
– year: 2002
  ident: ref11
  article-title: Attack on Internet Called Largest Ever
– ident: ref15
  doi: 10.1145/347057.347560
– ident: ref13
  doi: 10.21236/ADA400003
– ident: ref12
  doi: 10.1109/CSFW.1999.779758
– volume-title: Proc. IEEE Int’l Conf. Computer Comm. Networks (ICCCN)
  ident: ref10
  article-title: Intention-Driven ICMP Traceback
– ident: ref9
  doi: 10.1145/586110.586128
– ident: ref14
  doi: 10.1109/infcom.2001.916716
– ident: ref20
  doi: 10.1109/TPDS.2003.1233709
– ident: ref2
  doi: 10.1109/4236.991439
– year: 2000
  ident: ref16
  article-title: ICMP Traceback Messages
SSID ssj0014504
Score 2.1292043
Snippet Tracing DoS attacks that employ source address spoofing is an important and challenging problem. Traditional traceback schemes provide spoofed packets...
Traditional traceback schemes provide spoofed packets traceback capability either by augmenting the packets with partial path information (i.e., packet...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 403
SubjectTerms Analytical models
Computer crime
DDoS attacks
Delay
Information filtering
Information filters
Internet security
IP (Internet Protocol)
IP traceback
Logging
Mathematical analysis
Measurement
Performance analysis
Pipelines
Probability theory
Resource management
Routers
Security
Signatures
Simulation
Studies
Web and internet services
Title Novel hybrid schemes employing packet marking and logging for IP traceback
URI https://ieeexplore.ieee.org/document/1613850
https://www.proquest.com/docview/912206235
https://www.proquest.com/docview/28029815
https://www.proquest.com/docview/896193200
Volume 17
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT9wwEB1RTvRQWmjVhZb6QE9tFm_seJ1jVYoACYRUkLhF9niiSkAWsVmk9td37GTTTyRukfKkWI7HfuP5eAC73k_Ql05mwaDJNJHKLNa8loOcBmeJrIsR3ZNTc3ihjy-LyxX4ONTCEFFKPqNxfEyx_DDDRbwq22N2omx00J-w49bVag0RA10kqUD2LoqsZDMcktzLvfOz_a9d2MGoP46fpKfyzyacTpaDdThZjqlLKLkaL1o_xh9_tWt87KCfw7OeYopP3Zp4ASvUbMD6Ur5B9Na8AU9_60W4Ccens3u6Ft--xxIuwT4v3dBcUBIEZoBg3_qKWnHj0uW6cE0QPMQocSSY94qjM9HeOSTPsJdwcfDl_PNh1gstZKh00WbOoXSq1torqZXP-cgKxjDtlpa0Z4YTC2zNtAx5HspJYIqieGNAdr7Qosu9egWrzayh1yC8LCxhyAs3RY114UKNGJSpeUf2U12P4MNy_ivsu5BHMYzrKnkjsqzi34rimKYyagTvB_Rt133jAdxmnPhfmG7OR7C9_LVVb5rzqpzkuWTSV4zg3fCWbSoGSlxDs8W8ym1sTD9hhHgAYUsTma-UW___8jasdXc1MTPyDay2dwt6y-yl9Ttp2f4EveHtNg
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV1Lb9QwEB6VcgAOFFoQS4H6QE8oW68de5MDB0SpdvtYVWIr9Rb8mAiJNlt1s6DyW_gr_DfGTjY8e6zELVJGieIZz3yTGc8H8NLagbO54YnXTicpokwyV5Itez70JkPMTKjoHk306CTdP1WnK_CtOwuDiLH5DPvhMtby_cwtwq-yHUInMlO8baE8wKsvlKDNX493SZvbQuy9m74dJS2HQOJkqurEGMeNLNPUUt4urSBv7LUmRMkzTC0F73B2VA9zL4TPB56irySbd5RXuMwZYSU99xbcJpyhRHM6rKtRpCqSE1I-o5KcNn7XVp_vTI933zeFDi1_C3iRweUvtx9j2d4afF-uQtPC8qm_qG3fff1jQOT_ukwP4H4LotmbxuofwgpW67C2JKhgrb9ah3u_TFvcgP3J7DOesY9X4ZAao6wez3HOMFIekwC7MOTRanZuYvmAmcozWpJA4sQI2bPxMasvjUNLYo_g5Ea-7zGsVrMKnwCzXGXovFBm6FJXKuNL57zUJcUcO0zLHrxa6rtw7Zz1QPdxVsR8i-dFsI5A_6kLLXuw3UlfNPNFrpHbCIr-KdPouAebS1MqWuczL_KBEJxgrerBVneXvEYoBZkKZ4t5IbIwen9AEuwaiSzXAdtz_vTfb96CO6Pp0WFxOJ4cbMLd5s9U6AN9Bqv15QKfE1ar7Yu4ZRh8uGnj-wGU90bO
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Novel+hybrid+schemes+employing+packet+marking+and+logging+for+IP+traceback&rft.jtitle=IEEE+transactions+on+parallel+and+distributed+systems&rft.au=Al-Duwairi%2C+B&rft.au=Govindarasu%2C+M&rft.date=2006-05-01&rft.issn=1045-9219&rft.volume=17&rft.issue=5&rft_id=info:doi/10.1109%2FTPDS.2006.63&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1045-9219&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1045-9219&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1045-9219&client=summon