Link-Layer Traceback in Ethernet Networks

Michael Snow, J. Park
{"title":"Link-Layer Traceback in Ethernet Networks","authors":"Michael Snow, J. Park","doi":"10.1109/LANMAN.2007.4295996","DOIUrl":null,"url":null,"abstract":"The design of the most commonly-used Internet and local area network protocols provide no way of verifying the sender of a packet is who it claims to be. A malicious host can easily launch an attack while pretending to be another host to avoid being discovered. To determine the identity of an attacker, an administrator can use traceback, a technique that determines the path of attack packets from the victim to the coordinator. Most traceback research has focused on IP and stepping-stone techniques and little has been conducted on the problem of data-link layer trace-back (DLT), the process of tracing frames from the network edge to the attack source. We propose a scheme called tagged-frame traceback (TRACK) that provides a secure, reliable DLT technique for Ethernet networks. TRACK defines processes for Ethernet switches and a centralized storage and lookup host. Simulation results indicate that TRACK provides accurate DLT operation while causing minimal impact on network and application performance.","PeriodicalId":347028,"journal":{"name":"2007 15th IEEE Workshop on Local & Metropolitan Area Networks","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2007-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 15th IEEE Workshop on Local & Metropolitan Area Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LANMAN.2007.4295996","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

Abstract

The design of the most commonly-used Internet and local area network protocols provide no way of verifying the sender of a packet is who it claims to be. A malicious host can easily launch an attack while pretending to be another host to avoid being discovered. To determine the identity of an attacker, an administrator can use traceback, a technique that determines the path of attack packets from the victim to the coordinator. Most traceback research has focused on IP and stepping-stone techniques and little has been conducted on the problem of data-link layer trace-back (DLT), the process of tracing frames from the network edge to the attack source. We propose a scheme called tagged-frame traceback (TRACK) that provides a secure, reliable DLT technique for Ethernet networks. TRACK defines processes for Ethernet switches and a centralized storage and lookup host. Simulation results indicate that TRACK provides accurate DLT operation while causing minimal impact on network and application performance.
以太网中的链路层回溯
最常用的互联网和局域网协议的设计无法验证数据包的发送者是它声称的那个人。恶意主机可以很容易地发动攻击,同时假装成另一个主机,以避免被发现。为了确定攻击者的身份,管理员可以使用回溯技术,这是一种确定攻击数据包从受害者到协调器的路径的技术。大多数回溯研究都集中在IP和踏脚石技术上,很少有人研究数据链路层回溯(DLT)问题,即从网络边缘跟踪帧到攻击源的过程。我们提出了一种称为标记帧回溯(TRACK)的方案,它为以太网网络提供了一种安全、可靠的DLT技术。TRACK为以太网交换机和集中式存储和查找主机定义进程。仿真结果表明,TRACK提供了准确的DLT操作,同时对网络和应用性能的影响最小。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信