A Low Traceback and Zero Logging Overhead IP Traceback Approach for Communication Networks

S. Malliga, S. V. Kogilavani, P. Nandhini
{"title":"A Low Traceback and Zero Logging Overhead IP Traceback Approach for Communication Networks","authors":"S. Malliga, S. V. Kogilavani, P. Nandhini","doi":"10.1109/I2C2SW45816.2018.8997378","DOIUrl":null,"url":null,"abstract":"In an IP address spoofing attack, attackers send IP packets from a forged source address in order to camouflage themselves. Denial of Service attacks quite often employ IP spoofing to overwhelm a target with packets that appear to have come from legitimate IP addresses. Such attacks may be prevented by tracing these attacks back to their origin. IP traceback is a technique which plays a vital role in finding the source of spoofed packets. This paper reviews an ICMP traceback method, SPITRI and suggests a few changes in the way the packets are marked and tracked back. The proposed marking scheme reduces the number of clock cycles needed for marking and tracking back. Also, it does not require logging at any of the routers. The simulation results demonstrate that the refinements reduce the time for marking and tracing back with 100% accuracy.","PeriodicalId":212347,"journal":{"name":"2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW)","volume":"275 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I2C2SW45816.2018.8997378","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

In an IP address spoofing attack, attackers send IP packets from a forged source address in order to camouflage themselves. Denial of Service attacks quite often employ IP spoofing to overwhelm a target with packets that appear to have come from legitimate IP addresses. Such attacks may be prevented by tracing these attacks back to their origin. IP traceback is a technique which plays a vital role in finding the source of spoofed packets. This paper reviews an ICMP traceback method, SPITRI and suggests a few changes in the way the packets are marked and tracked back. The proposed marking scheme reduces the number of clock cycles needed for marking and tracking back. Also, it does not require logging at any of the routers. The simulation results demonstrate that the refinements reduce the time for marking and tracing back with 100% accuracy.
通信网络的低回溯和零日志开销IP回溯方法
在IP地址欺骗攻击中,攻击者通过伪造的源地址发送IP报文来伪装自己。拒绝服务攻击通常使用IP欺骗,用看似来自合法IP地址的数据包压倒目标。可以通过追踪这些攻击的源头来防止这些攻击。IP回溯是一种查找欺骗报文来源的重要技术。本文回顾了一种ICMP回溯方法SPITRI,并建议在标记和回溯数据包的方式上进行一些更改。所提出的标记方案减少了标记和跟踪所需的时钟周期数。此外,它不需要在任何路由器上进行日志记录。仿真结果表明,改进后的标记和回溯时间缩短,准确率达到100%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信