...
首页> 外文期刊>IEEE Transactions on Computers >A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking
【24h】

A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking

机译:通过动态确定性数据包标记实现可行的IP回溯框架

获取原文
获取原文并翻译 | 示例

摘要

DDoS attack source traceback is an open and challenging problem. Deterministic packet marking (DPM) is a simple and effective traceback mechanism, but the current DPM based traceback schemes are not practical due to their scalability constraint. We noticed a factor that only a limited number of computers and routers are involved in an attack session. Therefore, we only need to mark these involved nodes for traceback purpose, rather than marking every node of the Internet as the existing schemes doing. Based on this finding, we propose a novel marking on demand (MOD) traceback scheme based on the DPM mechanism. In order to traceback to involved attack source, what we need to do is to mark these involved ingress routers using the traditional DPM strategy. Similar to existing schemes, we require participated routers to install a traffic monitor. When a monitor notices a surge of suspicious network flows, it will request a unique mark from a globally shared MOD server, and mark the suspicious flows with the unique marks. At the same time, the MOD server records the information of the marks and their related requesting IP addresses. Once a DDoS attack is confirmed, the victim can obtain the attack sources by requesting the MOD server with the marks extracted from attack packets. Moreover, we use the marking space in a round-robin style, which essentially addresses the scalability problem of the existing DPM based traceback schemes. We establish a mathematical model for the proposed traceback scheme, and thoroughly analyze the system. Theoretical analysis and extensive real-world data experiments demonstrate that the proposed traceback method is feasible and effective.
机译:DDoS攻击源回溯是一个开放且具有挑战性的问题。确定性数据包标记(DPM)是一种简单有效的回溯机制,但是当前基于DPM的回溯方案由于其可伸缩性约束而并不实用。我们注意到一个因素,即攻击会话仅涉及有限数量的计算机和路由器。因此,我们仅需要标记这些涉及的节点以进行追溯,而不必像现有方案那样标记Internet的每个节点。基于此发现,我们提出了一种基于DPM机制的新颖的按需标记(MOD)追溯方案。为了追溯到涉及的攻击源,我们需要做的是使用传统的DPM策略标记这些涉及的入口路由器。与现有方案类似,我们要求参与的路由器安装流量监控器。当监视器注意到可疑网络流量激增时,它将向全局共享的MOD服务器请求唯一标记,并用该唯一标记标记可疑流量。同时,MOD服务器记录标记及其相关请求IP地址的信息。确认DDoS攻击后,受害者可以通过向MOD服务器请求从攻击数据包中提取的标记来获得攻击源。此外,我们以循环方式使用标记空间,这实质上解决了现有基于DPM的回溯方案的可伸缩性问题。我们为提出的回溯方案建立了数学模型,并对系统进行了全面分析。理论分析和大量实际数据实验表明,提出的回溯方法是可行和有效的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号