Abstract
In this article, we present a novel approach to IP Traceback - deterministic packet marking (DPM).1Three U.S. Patent applications have been filed based on the content of this work.1 DPM is based on marking all packets at ingress interfaces. DPM is scalable, simple to implement, and introduces no bandwidth and practically no processing overhead on the network equipment. It is capable of tracing thousands of simultaneous attackers during a DDoS attack. Given sufficient deployment on the Internet, DPM is capable of tracing back to the slaves responsible for DDoS attacks that involve reflectors. In DPM, most of the processing required for traceback is done at the victim. The traceback process can be performed post-mortem allowing for tracing the attacks that may not have been noticed initially, or the attacks which would deny service to the victim so that traceback is impossible in real time. The involvement of the Internet Service Providers (ISPs) is very limited, and changes to the infrastructure and operation required to deploy DPM are minimal. DPM is capable of performing the traceback without revealing topology of the providers' network, which is a desirable quality of a traceback method.
Original language | English (US) |
---|---|
Pages (from-to) | 2677-2700 |
Number of pages | 24 |
Journal | Computer Networks |
Volume | 51 |
Issue number | 10 |
DOIs | |
State | Published - Jul 11 2007 |
All Science Journal Classification (ASJC) codes
- Computer Networks and Communications
Keywords
- DDoS attacks
- IP traceback
- Security