会议专题

A Real-Time Traceback Scheme For DDoS Attacks

Due to the fact that IP spoofing technique is frequently used, defending distributed denial of service (DDoS) attacks faces extreme difficulty. Recently, several approaches have been proposed for path identification to trace DDoS attacks.However, most of these schemes require very large number of packets to conduct the traceback process, which results in lengthy and complicated procedure. This paper proposes a novel DDoS traceback scheme based on real-time consideration by dividing the tracing process into two steps. In the first step,Probabilistic Packet Marking (PPM) Based on Autonomous System (AS) (ASPPM) is adopted to determine the attack-originating AS. In the second step, Random Number Packet Marking (RNPM) is used to identify the exact origin of the attacks in the specific AS. Compared with previous schemes, the two-step traceback scheme has the benefits of quick convergence speed, light computational overhead and low false positive, hence making it possible to trace the DDoS source on a real-time basis.

Network Security DDoS Attacks Traceback Packet Marking

Changlai Huang Ming Li Jianghu Yang Chuanshan Gao

Department of Computer Science & Engineering, Fudan University Shanghai, 200433, P.R.China

国际会议

2005年无线通信、网络和移动计算国际会议

武汉

英文

1175-1179

2005-09-23(万方平台首次上网日期,不代表论文的发表时间)