{"title":"通信网络的低回溯和零日志开销IP回溯方法","authors":"S. Malliga, S. V. Kogilavani, P. Nandhini","doi":"10.1109/I2C2SW45816.2018.8997378","DOIUrl":null,"url":null,"abstract":"In an IP address spoofing attack, attackers send IP packets from a forged source address in order to camouflage themselves. Denial of Service attacks quite often employ IP spoofing to overwhelm a target with packets that appear to have come from legitimate IP addresses. Such attacks may be prevented by tracing these attacks back to their origin. IP traceback is a technique which plays a vital role in finding the source of spoofed packets. This paper reviews an ICMP traceback method, SPITRI and suggests a few changes in the way the packets are marked and tracked back. The proposed marking scheme reduces the number of clock cycles needed for marking and tracking back. Also, it does not require logging at any of the routers. The simulation results demonstrate that the refinements reduce the time for marking and tracing back with 100% accuracy.","PeriodicalId":212347,"journal":{"name":"2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW)","volume":"275 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A Low Traceback and Zero Logging Overhead IP Traceback Approach for Communication Networks\",\"authors\":\"S. Malliga, S. V. Kogilavani, P. Nandhini\",\"doi\":\"10.1109/I2C2SW45816.2018.8997378\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In an IP address spoofing attack, attackers send IP packets from a forged source address in order to camouflage themselves. Denial of Service attacks quite often employ IP spoofing to overwhelm a target with packets that appear to have come from legitimate IP addresses. Such attacks may be prevented by tracing these attacks back to their origin. IP traceback is a technique which plays a vital role in finding the source of spoofed packets. This paper reviews an ICMP traceback method, SPITRI and suggests a few changes in the way the packets are marked and tracked back. The proposed marking scheme reduces the number of clock cycles needed for marking and tracking back. Also, it does not require logging at any of the routers. The simulation results demonstrate that the refinements reduce the time for marking and tracing back with 100% accuracy.\",\"PeriodicalId\":212347,\"journal\":{\"name\":\"2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW)\",\"volume\":\"275 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/I2C2SW45816.2018.8997378\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I2C2SW45816.2018.8997378","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Low Traceback and Zero Logging Overhead IP Traceback Approach for Communication Networks
In an IP address spoofing attack, attackers send IP packets from a forged source address in order to camouflage themselves. Denial of Service attacks quite often employ IP spoofing to overwhelm a target with packets that appear to have come from legitimate IP addresses. Such attacks may be prevented by tracing these attacks back to their origin. IP traceback is a technique which plays a vital role in finding the source of spoofed packets. This paper reviews an ICMP traceback method, SPITRI and suggests a few changes in the way the packets are marked and tracked back. The proposed marking scheme reduces the number of clock cycles needed for marking and tracking back. Also, it does not require logging at any of the routers. The simulation results demonstrate that the refinements reduce the time for marking and tracing back with 100% accuracy.