{"title":"Hash Based AS Traceback against DoS Attack","authors":"Sharmin Aktar, A. Nur","doi":"10.1109/CommNet52204.2021.9641969","DOIUrl":null,"url":null,"abstract":"The design of IP protocol creates difficulties in identifying the true source of any packet, which makes it one of the most arduous problems to defend against Denial of Service (DoS) attacks. This paper introduces an Autonomous System (AS) traceback mechanism based on probabilistic packet marking, which allows the victim to trace the attack-originating AS. Traceback on the AS level has several advantages containing a reduced number of routers involvement for packet marking as well as the required number of packets to infer the forward path. We utilize the IP packet header to implement our packet marking methodology. Our results show that a victim site can trace the attack path with 33.25 packets on average. Additionally, we provide an encoding method to significantly reduce the false cases in path reconstruction.","PeriodicalId":354985,"journal":{"name":"2021 4th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 4th International Conference on Advanced Communication Technologies and Networking (CommNet)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CommNet52204.2021.9641969","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The design of IP protocol creates difficulties in identifying the true source of any packet, which makes it one of the most arduous problems to defend against Denial of Service (DoS) attacks. This paper introduces an Autonomous System (AS) traceback mechanism based on probabilistic packet marking, which allows the victim to trace the attack-originating AS. Traceback on the AS level has several advantages containing a reduced number of routers involvement for packet marking as well as the required number of packets to infer the forward path. We utilize the IP packet header to implement our packet marking methodology. Our results show that a victim site can trace the attack path with 33.25 packets on average. Additionally, we provide an encoding method to significantly reduce the false cases in path reconstruction.