{"title":"一种增强的IP回溯混合方案","authors":"Subash A, A. Cs, V. M","doi":"10.1109/ICITIIT57246.2023.10068579","DOIUrl":null,"url":null,"abstract":"Internet has become a highly influential medium in recent years and this has led to the arrival of threats like DDoS attacks. DDoS attacks are in rising spree, as attackers are very well resourced. IP spoofing makes the situation further worse by concealing the attacker's identity. The IP Traceback mechanism is effective in identifying the origin of the attack. This paper outlines a hybrid traceback technique with packet marking followed by logging. The proposed scheme utilizes a minimized marking field of 16 bits in an IP header compared to existing techniques. The maximum storage requirement will be around 384 KB (based on CAIDA dataset) for logging on all routers. The path reconstruction has zero false positive and false negative rates. Therefore, the proposed scheme eliminates the packet fragmentation problem by reducing the number of digits for marking with a negligible increase in the storage.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Enhanced Hybrid Scheme for IP Traceback\",\"authors\":\"Subash A, A. Cs, V. M\",\"doi\":\"10.1109/ICITIIT57246.2023.10068579\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet has become a highly influential medium in recent years and this has led to the arrival of threats like DDoS attacks. DDoS attacks are in rising spree, as attackers are very well resourced. IP spoofing makes the situation further worse by concealing the attacker's identity. The IP Traceback mechanism is effective in identifying the origin of the attack. This paper outlines a hybrid traceback technique with packet marking followed by logging. The proposed scheme utilizes a minimized marking field of 16 bits in an IP header compared to existing techniques. The maximum storage requirement will be around 384 KB (based on CAIDA dataset) for logging on all routers. The path reconstruction has zero false positive and false negative rates. Therefore, the proposed scheme eliminates the packet fragmentation problem by reducing the number of digits for marking with a negligible increase in the storage.\",\"PeriodicalId\":170485,\"journal\":{\"name\":\"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)\",\"volume\":\"57 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITIIT57246.2023.10068579\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITIIT57246.2023.10068579","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Internet has become a highly influential medium in recent years and this has led to the arrival of threats like DDoS attacks. DDoS attacks are in rising spree, as attackers are very well resourced. IP spoofing makes the situation further worse by concealing the attacker's identity. The IP Traceback mechanism is effective in identifying the origin of the attack. This paper outlines a hybrid traceback technique with packet marking followed by logging. The proposed scheme utilizes a minimized marking field of 16 bits in an IP header compared to existing techniques. The maximum storage requirement will be around 384 KB (based on CAIDA dataset) for logging on all routers. The path reconstruction has zero false positive and false negative rates. Therefore, the proposed scheme eliminates the packet fragmentation problem by reducing the number of digits for marking with a negligible increase in the storage.