{"title":"使用包标记技术的IP回溯概述","authors":"Swapnil M. Sanap, P. Pawar","doi":"10.1109/ICACEA.2015.7164816","DOIUrl":null,"url":null,"abstract":"A network comprises of a plurality of nodes working together to perform similar or different tasks. The network has a huge room for attacks so as to make the network inefficient. The major attacks that are causing huge turbulences to the network and its equivalent resources include Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks. In prior-art there are many techniques that can sense and avoid these attacks. Packet Marking (PM) techniques are the most widely used successful techniques towards avoiding these attacks. However, there are some critical issues with the PM techniques, as these attacks are becoming more complicated due to growing talent in the market. PM technique can be used further to traceback the origin of attacks. In this traceback the major contest is to minimize the amount of packets in successful traceback of these attacks. The packets that are originating from the sources are not enough to traceback the origin. The paper discusses various known PM techniques available for fighting back against the mentioned attacks. Further, the paper also discloses the implementation of these techniques, their advantages, disadvantages, complexity analysis, and the results measured. Future trends including the need for effective and efficient defense mechanism are also discussed.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"sOverview of IP tracebacking using packet marking techniques\",\"authors\":\"Swapnil M. Sanap, P. Pawar\",\"doi\":\"10.1109/ICACEA.2015.7164816\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A network comprises of a plurality of nodes working together to perform similar or different tasks. The network has a huge room for attacks so as to make the network inefficient. The major attacks that are causing huge turbulences to the network and its equivalent resources include Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks. In prior-art there are many techniques that can sense and avoid these attacks. Packet Marking (PM) techniques are the most widely used successful techniques towards avoiding these attacks. However, there are some critical issues with the PM techniques, as these attacks are becoming more complicated due to growing talent in the market. PM technique can be used further to traceback the origin of attacks. In this traceback the major contest is to minimize the amount of packets in successful traceback of these attacks. The packets that are originating from the sources are not enough to traceback the origin. The paper discusses various known PM techniques available for fighting back against the mentioned attacks. Further, the paper also discloses the implementation of these techniques, their advantages, disadvantages, complexity analysis, and the results measured. Future trends including the need for effective and efficient defense mechanism are also discussed.\",\"PeriodicalId\":202893,\"journal\":{\"name\":\"2015 International Conference on Advances in Computer Engineering and Applications\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-03-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Advances in Computer Engineering and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACEA.2015.7164816\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Advances in Computer Engineering and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACEA.2015.7164816","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
摘要
网络由一起工作以执行相似或不同任务的多个节点组成。网络具有巨大的攻击空间,使得网络效率低下。目前对网络及其等价资源造成巨大动荡的主要攻击包括DoS (Denial of Service)攻击和DDoS (Distributed Denial of Service)攻击。在现有技术中,有许多技术可以感知和避免这些攻击。包标记(PM)技术是避免这些攻击最广泛使用的成功技术。然而,由于市场上人才的增长,这些攻击变得越来越复杂,因此PM技术存在一些关键问题。PM技术可以进一步用于追踪攻击的来源。在这种回溯中,主要的竞争是尽量减少成功追溯这些攻击的数据包数量。从源端发出的数据包不足以追溯到源端。本文讨论了各种已知的可用于反击上述攻击的PM技术。此外,本文还揭示了这些技术的实现、优缺点、复杂性分析和测量结果。未来的发展趋势,包括需要有效和高效的防御机制。
sOverview of IP tracebacking using packet marking techniques
A network comprises of a plurality of nodes working together to perform similar or different tasks. The network has a huge room for attacks so as to make the network inefficient. The major attacks that are causing huge turbulences to the network and its equivalent resources include Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks. In prior-art there are many techniques that can sense and avoid these attacks. Packet Marking (PM) techniques are the most widely used successful techniques towards avoiding these attacks. However, there are some critical issues with the PM techniques, as these attacks are becoming more complicated due to growing talent in the market. PM technique can be used further to traceback the origin of attacks. In this traceback the major contest is to minimize the amount of packets in successful traceback of these attacks. The packets that are originating from the sources are not enough to traceback the origin. The paper discusses various known PM techniques available for fighting back against the mentioned attacks. Further, the paper also discloses the implementation of these techniques, their advantages, disadvantages, complexity analysis, and the results measured. Future trends including the need for effective and efficient defense mechanism are also discussed.