Open Access Open Access  Restricted Access Subscription Access

Survey on Packet Marking Algorithms for IP Traceback


Affiliations
1 Dept of Information Technology, Kakatiya Institute of Technology and Science, Warangal, Telangana, India
2 Dept of Computer Science, Vaagdevi College of Engineering, Warangal, Telangana, India
3 Dept of Computer Science, Jawaharlal Nehru Technological University, Hyderabad, Telangana, India
 

Distributed Denial of Service (DDoS) attack is an unavoidable attack. Among various attacks on the network, DDoS attacks are difficult to detect because of IP spoofing. The IP traceback is the only technique to identify DDoS attacks. The path affected by DDoS attack is identified by IP traceback approaches like Probabilistic Packet marking algorithm (PPM) and Deterministic Packet Marking algorithm (DPM). The PPM approach finds the complete attack path from victim to the source where as DPM finds only the source of the attacker. Using DPM algorithm finding the source of the attacker is difficult, if the router get compromised. Using PPM algorithm we construct the complete attack path, so the compromised router can be identified. In this paper, we review PPM and DPM techniques and compare the strengths and weaknesses of each proposal.

Keywords

Distributed Denial of Service, Deterministic Packet Marking, IP Traceback, Packet Marking, Probabilistic Packet Marking.
User
Notifications
Font Size


  • Survey on Packet Marking Algorithms for IP Traceback

Abstract Views: 292  |  PDF Views: 7

Authors

Y. Bhavani
Dept of Information Technology, Kakatiya Institute of Technology and Science, Warangal, Telangana, India
V. Janaki
Dept of Computer Science, Vaagdevi College of Engineering, Warangal, Telangana, India
R. Sridevi
Dept of Computer Science, Jawaharlal Nehru Technological University, Hyderabad, Telangana, India

Abstract


Distributed Denial of Service (DDoS) attack is an unavoidable attack. Among various attacks on the network, DDoS attacks are difficult to detect because of IP spoofing. The IP traceback is the only technique to identify DDoS attacks. The path affected by DDoS attack is identified by IP traceback approaches like Probabilistic Packet marking algorithm (PPM) and Deterministic Packet Marking algorithm (DPM). The PPM approach finds the complete attack path from victim to the source where as DPM finds only the source of the attacker. Using DPM algorithm finding the source of the attacker is difficult, if the router get compromised. Using PPM algorithm we construct the complete attack path, so the compromised router can be identified. In this paper, we review PPM and DPM techniques and compare the strengths and weaknesses of each proposal.

Keywords


Distributed Denial of Service, Deterministic Packet Marking, IP Traceback, Packet Marking, Probabilistic Packet Marking.

References





DOI: https://doi.org/10.13005/ojcst%2F10.02.36