An Enhanced Hybrid Scheme for IP Traceback

Subash A, A. Cs, V. M
{"title":"An Enhanced Hybrid Scheme for IP Traceback","authors":"Subash A, A. Cs, V. M","doi":"10.1109/ICITIIT57246.2023.10068579","DOIUrl":null,"url":null,"abstract":"Internet has become a highly influential medium in recent years and this has led to the arrival of threats like DDoS attacks. DDoS attacks are in rising spree, as attackers are very well resourced. IP spoofing makes the situation further worse by concealing the attacker's identity. The IP Traceback mechanism is effective in identifying the origin of the attack. This paper outlines a hybrid traceback technique with packet marking followed by logging. The proposed scheme utilizes a minimized marking field of 16 bits in an IP header compared to existing techniques. The maximum storage requirement will be around 384 KB (based on CAIDA dataset) for logging on all routers. The path reconstruction has zero false positive and false negative rates. Therefore, the proposed scheme eliminates the packet fragmentation problem by reducing the number of digits for marking with a negligible increase in the storage.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITIIT57246.2023.10068579","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Internet has become a highly influential medium in recent years and this has led to the arrival of threats like DDoS attacks. DDoS attacks are in rising spree, as attackers are very well resourced. IP spoofing makes the situation further worse by concealing the attacker's identity. The IP Traceback mechanism is effective in identifying the origin of the attack. This paper outlines a hybrid traceback technique with packet marking followed by logging. The proposed scheme utilizes a minimized marking field of 16 bits in an IP header compared to existing techniques. The maximum storage requirement will be around 384 KB (based on CAIDA dataset) for logging on all routers. The path reconstruction has zero false positive and false negative rates. Therefore, the proposed scheme eliminates the packet fragmentation problem by reducing the number of digits for marking with a negligible increase in the storage.
一种增强的IP回溯混合方案
近年来,互联网已成为一种极具影响力的媒体,这导致了DDoS攻击等威胁的到来。DDoS攻击呈上升趋势,因为攻击者资源丰富。IP欺骗通过隐藏攻击者的身份使情况进一步恶化。IP回溯机制可以有效地识别攻击的来源。本文概述了一种带有数据包标记和日志记录的混合回溯技术。与现有技术相比,该方案利用IP报头中最小的16位标记域。登录所有路由器的最大存储需求大约是384 KB(基于CAIDA数据集)。路径重构的假阳性和假阴性率均为零。因此,该方案通过减少用于标记的位数来消除数据包碎片问题,而存储的增加可以忽略不计。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信