Probabilistic Route Selection Algorithm for IP Traceback
DoS(Denial of Service) or DDoS(Distributed DoS) attack is a major threaten and the most difficult problem to solve among many attacks. Moreover, it is very difficult to find a real origin of attackers because DoS/DDoS attacker uses spoofed IP addresses. To solve this problem, we propose a probabilis...
Saved in:
Published in | Security Technology, Disaster Recovery and Business Continuity Vol. 122; pp. 94 - 103 |
---|---|
Main Authors | , |
Format | Book Chapter |
Language | English |
Published |
Germany
Springer Berlin / Heidelberg
2010
Springer Berlin Heidelberg |
Series | Communications in Computer and Information Science |
Subjects | |
Online Access | Get full text |
ISBN | 3642176097 9783642176098 |
ISSN | 1865-0929 1865-0937 |
DOI | 10.1007/978-3-642-17610-4_11 |
Cover
Abstract | DoS(Denial of Service) or DDoS(Distributed DoS) attack is a major threaten and the most difficult problem to solve among many attacks. Moreover, it is very difficult to find a real origin of attackers because DoS/DDoS attacker uses spoofed IP addresses. To solve this problem, we propose a probabilistic route selection traceback algorithm, namely PRST, to trace the attacker’s real origin. This algorithm uses two types of packets such as an agent packet and a reply agent packet. The agent packet is in use to find the attacker’s real origin and the reply agent packet is in use to notify to a victim that the agent packet is reached the edge router of the attacker. After attacks occur, the victim generates the agent packet and sends it to a victim’s edge router. The attacker’s edge router received the agent packet generates the reply agent packet and send it to the victim. The agent packet and the reply agent packet is forwarded refer to probabilistic packet forwarding table (PPFT) by routers. The PRST algorithm runs on the distributed routers and PPFT is stored and managed by routers. We validate PRST algorithm by using mathematical approach based on Poisson distribution. |
---|---|
AbstractList | DoS(Denial of Service) or DDoS(Distributed DoS) attack is a major threaten and the most difficult problem to solve among many attacks. Moreover, it is very difficult to find a real origin of attackers because DoS/DDoS attacker uses spoofed IP addresses. To solve this problem, we propose a probabilistic route selection traceback algorithm, namely PRST, to trace the attacker’s real origin. This algorithm uses two types of packets such as an agent packet and a reply agent packet. The agent packet is in use to find the attacker’s real origin and the reply agent packet is in use to notify to a victim that the agent packet is reached the edge router of the attacker. After attacks occur, the victim generates the agent packet and sends it to a victim’s edge router. The attacker’s edge router received the agent packet generates the reply agent packet and send it to the victim. The agent packet and the reply agent packet is forwarded refer to probabilistic packet forwarding table (PPFT) by routers. The PRST algorithm runs on the distributed routers and PPFT is stored and managed by routers. We validate PRST algorithm by using mathematical approach based on Poisson distribution. |
Author | Jung, Jae-il Yim, Hong-bin |
Author_xml | – sequence: 1 givenname: Hong-bin surname: Yim fullname: Yim, Hong-bin organization: Department of Electronics and Computer Engineering, Hanyang University, Seoul, Korea – sequence: 2 givenname: Jae-il surname: Jung fullname: Jung, Jae-il organization: Department of Electronics and Computer Engineering, Hanyang University, Seoul, Korea |
BookMark | eNo9kFtPAjEQhauiEZB_4MP-gWpv28sjIV5ISCTKe9NdprCybrFd_r_lEudlknPyncycERp0oQOEHil5ooSoZ6M05lgKhqmSlGBhKb1CkyzzLJ40cY2GVMsSE8PVDRpdDGLU4N9g5g4NZfaV0drco0lK3ySPEFJJNUR6GUPlqqZtUt_UxWc49FB8QQt134SumLabEJt--1P4EIv5slhFV0Pl6t0DuvWuTTC57DFavb6sZu948fE2n00XeE9LTbH36xKUk-BZPoEaB4RR4UEQ8Gsh_ZoTTxn3Vekr5rgXpNLGGM14yVSt-Rixc2zax6bbQLRVCLtkKbHHmmzuw3KbH7enSuyxpgyJM7SP4fcAqbdwpGro-ujaeuv2PcRkOZGSKpoJk8ME_wOEEGcX |
ContentType | Book Chapter |
Copyright | Springer-Verlag Berlin Heidelberg 2010 |
Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2010 |
DBID | FFUUA |
DOI | 10.1007/978-3-642-17610-4_11 |
DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISBN | 9783642176104 3642176100 |
EISSN | 1865-0937 |
Editor | Fang, Wai-Chi Kang, Heau-jo Arnett, Kirk P Khurram Khan, Muhammad Ślęzak, Dominik |
Editor_xml | – sequence: 1 fullname: Fang, Wai-Chi – sequence: 2 fullname: Ślęzak, Dominik – sequence: 3 fullname: Kang, Heau-jo – sequence: 4 fullname: Arnett, Kirk P – sequence: 5 fullname: Khurram Khan, Muhammad |
EndPage | 103 |
ExternalDocumentID | EBC3066171_119_104 |
GroupedDBID | -T. 089 0D6 0DA 20A 38. 4UP 4V3 9-X A4J AABBV ABBVZ ABMKK ABMNI ACDPG ACZTO ADVHH AEJLV AEKFX AEOKE AETDV AEZAY AHSMR ALMA_UNASSIGNED_HOLDINGS AZZ BBABE CZZ FFUUA I4C IEZ JJU MA. MYL SBO SNUHX TBMHI TPJZQ Z5O Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z87 Z88 29F RSU |
ID | FETCH-LOGICAL-p1581-ffd5e7a6ef277919ae0214fe40efd46fd30f123fb5fb2a3f40b8999823527c83 |
ISBN | 3642176097 9783642176098 |
ISSN | 1865-0929 |
IngestDate | Tue Jul 29 19:59:24 EDT 2025 Wed May 28 23:38:58 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
LCCallNum | QA75.5-76.95 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-p1581-ffd5e7a6ef277919ae0214fe40efd46fd30f123fb5fb2a3f40b8999823527c83 |
OCLC | 693779889 |
PQID | EBC3066171_119_104 |
PageCount | 10 |
ParticipantIDs | springer_books_10_1007_978_3_642_17610_4_11 proquest_ebookcentralchapters_3066171_119_104 |
PublicationCentury | 2000 |
PublicationDate | 2010 |
PublicationDateYYYYMMDD | 2010-01-01 |
PublicationDate_xml | – year: 2010 text: 2010 |
PublicationDecade | 2010 |
PublicationPlace | Germany |
PublicationPlace_xml | – name: Germany – name: Berlin, Heidelberg |
PublicationSeriesTitle | Communications in Computer and Information Science |
PublicationSubtitle | International Conferences, SecTech and DRBC 2010, Held As Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings |
PublicationTitle | Security Technology, Disaster Recovery and Business Continuity |
PublicationYear | 2010 |
Publisher | Springer Berlin / Heidelberg Springer Berlin Heidelberg |
Publisher_xml | – name: Springer Berlin / Heidelberg – name: Springer Berlin Heidelberg |
SSID | ssj0000446767 ssj0000580895 ssib054953581 |
Score | 1.356137 |
Snippet | DoS(Denial of Service) or DDoS(Distributed DoS) attack is a major threaten and the most difficult problem to solve among many attacks. Moreover, it is very... |
SourceID | springer proquest |
SourceType | Publisher |
StartPage | 94 |
SubjectTerms | DDoS attack IP Traceback Network Security PRST |
Title | Probabilistic Route Selection Algorithm for IP Traceback |
URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=3066171&ppg=104 http://link.springer.com/10.1007/978-3-642-17610-4_11 |
Volume | 122 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELagLMDAW7zlga0KShonTkZARaUC1KGgbpad2lCpFETLAL-eO8dJ09KlLFGUxIl1n3O6O999R8iFSsEMiVPpKfAuPBYo7smERR6L_dA0dN9XtnvDw2PcemLtXtSb9suz1SUTdZn9LKwr-Q-qcA1wxSrZJZAtXwoX4BzwhSMgDMc543c2zJrXcLjOc5XouFUgg7FE8gM0CDE9M-dXKvPbkY1qMPoaTL6ri6XzCb81pskia3Mds4Q0aJGhzvuIXw1f3uFLr282J_Gug4zomVbS8em7mIFNPavGDIqYYd1RaiFB-iJaLVviwcBpif28VXSpMvNa4j_qt5pxAQORfRI-zoTTpzNs167t8BzbdfP6BpwYMKsCGJSKAKleV3nCamTtqtm-fy7jZ7gRzWNsuVhOkeeEStMpV0olF81pxqmY2we35kV3m2xiyQnFWhCY5Q5Z0aNdslU03KBO_-6SjQp75B5JZlCjFjVaokZL1CigRu86tERtn3Rvm92blucaYXgfQZQEnjH9SHMZa9PgPA1SqZHpzmjma9NnsemHvgELxKjIqIYMDfMVuNFp0gDrmmdJeEBqo_eRPiQ0VGkEt3VmMgOOeSAD7TMVwqiYZzKSR8QrRCLsbr1LEc5yAYzFHDhHpF7ITeDjY1HQYIPARShA4MIKXKDAj5d8-wlZn67eU1KbfH7pM7ABJ-rcLYdfvgtWXw |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Security+Technology%2C+Disaster+Recovery+and+Business+Continuity&rft.atitle=Probabilistic+Route+Selection+Algorithm+for+IP+Traceback&rft.date=2010-01-01&rft.pub=Springer+Berlin+%2F+Heidelberg&rft.isbn=9783642176098&rft.volume=122&rft_id=info:doi/10.1007%2F978-3-642-17610-4_11&rft.externalDBID=104&rft.externalDocID=EBC3066171_119_104 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F3066171-l.jpg |