Open Access
Subscription Access
Survey on Packet Marking Algorithms for IP Traceback
Distributed Denial of Service (DDoS) attack is an unavoidable attack. Among various attacks on the network, DDoS attacks are difficult to detect because of IP spoofing. The IP traceback is the only technique to identify DDoS attacks. The path affected by DDoS attack is identified by IP traceback approaches like Probabilistic Packet marking algorithm (PPM) and Deterministic Packet Marking algorithm (DPM). The PPM approach finds the complete attack path from victim to the source where as DPM finds only the source of the attacker. Using DPM algorithm finding the source of the attacker is difficult, if the router get compromised. Using PPM algorithm we construct the complete attack path, so the compromised router can be identified. In this paper, we review PPM and DPM techniques and compare the strengths and weaknesses of each proposal.
Keywords
Distributed Denial of Service, Deterministic Packet Marking, IP Traceback, Packet Marking, Probabilistic Packet Marking.
User
Font Size
Information
- Marion Vasseur, Xiuzhen Chen, Rida Khatoun, Ahmed Serhrouchni, Survey on Packet Marking Fields and Information for IP Traceback, In Proc. Int. Conf. on Cyber Security of Smart cities, Industrial Control System and Communications (SSIC), 2015.
- R. Kiremire Ankunda, R. Brust Matthias, V. Phoha Vir, Using network motifs to investigate the influence of network topology on PPM based IP traceback schemes. Computer Network, 2014; 14–32.
- Anatolii Balyk, Uliana Latsykovska, Mikolaj Karpinski, Yuliia Khokhlachova, Aigul Shaikhanova, Lesia Korkishko, A Survey of Modern IP Traceback Methodologies. In Proc. 8th IEEE Int. Conf. on Intelligent Data Acquisition and Advanced Computing Systems, 2015: pp. 484-488.
- S. Savage, D. Wetherall, A. Karlin, T. Anderson, Practical network support for IP Traceback. In Proc. ACM SIGCOMM conference, 2000; pp. 295-306.
- DX Song, A. Perrig, Advanced and authenticated marking schemes for IP Traceback. In Proc. IEEE INFOCOM, 2001; pp. 878–86.
- Snoeren AC, Partridge C, Sanchez LA, Jones CE, Tchakountio F, Kent ST, Hash-based IP Traceback. In Proc. ACM SIGCOMM, 2001.
- Wong Tsz-Yeung, Wong Man-Hon, Lui Chi-Shing, A precise termination condition of the probabilistic packet marking algorithm. IEEE Transactions on Dependable Secure Computing, 2008; 5: 6–21.
- Lih-Chyau, Liu Tzong-Jye, Yang Jyun-Yan, IP traceback based on Chinese Remainder Theorem. In Proc. 6th IASTED Int. Conf. on Communications, Internet, and Information Technology, 2007, pp. 214–219.
- Y. Bhavani, V. Janaki, R. Sridevi, IP traceback through modified probabilistic packet marking algorithm using Chinese remainder theorem, Ain Shams Engineering Journal, 2015; 6: 715–722.
- D. Dean, M. Franklin, A. Stubblefield, An algebraic approach to IP Traceback. ACM Transactions on Information and System Security, 2002; 5: 119–137.
- K. Park, H. Lee, On the effectiveness of probabilistic packet marking for IP Traceback under denial-of-service attacks, In Proc. IEEE INFOCOM, 2001.
- Y. Bhavani, V. Janaki, R. Sridevi, IP Traceback through modified probabilistic packet marking algorithm. In Proc. IEEE Region10 conference TENCON, 2013, pp.1565-1569.
- Andrey Belenky and Nirwan Ansari, IP Traceback with Deterministic Packet Marking. IEEE Communications Letters 7, 2003; 162-164.
- Ashwani Parashar, Dr. Ramaswami Radhakrishnan, Improved Deterministic Packet Marking Algorithm. In Proc. of 15th Int. Conf. on Advanced Computing Technologies, 2013.
- Yang Xiang , Wanlei Zhou , Minyi Guo, Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks. IEEE Transactions on Parallel and Distributed Systems, 2009; 20: 567 – 580.
- S. Yu, W. Zhou, S. Guo, M. Guo, A feasible IP traceback framework through dynamic deterministic packet marking. IEEE Transactions on Computers, 2016; 65: 1418–1427.
Abstract Views: 201
PDF Views: 7