Abstract | ||
---|---|---|
Resource exhaustion attacks or denial of service attacks (DoS) have emerged as a major way to compromise the availability of servers and interrupt legitimate online services. IP trace back refers to the problem of identifying the source of such attacks. Packet marking is a general technique to trace back attackers. The main idea in packet marking is to insert some trace back data in each packet. The general technique used is to encode the IP address of the edge router into each incoming packet and store it in the 16-bit ID field of the IP packet header. Since information of a 32-bit field is converted to a 16-bit field, irrespective of the hash function used, collisions occur. This means there will be false positives (that is incorrectly identifying a legitimate user as attacker) and the problem will escalate as the size of the network increase. To avoid such collisions, we propose to explore the feasibility of using packet marks that is not directly dependant on the IP address of the packet. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1109/SASOW.2015.33 | SASO Workshops |
Keywords | Field | DocType |
star coloring, packet marking, distributed star coloring, attack path construction | End-to-end delay,Packet analyzer,Computer science,Martian packet,Computer security,Computer network,Link state packet,Loose Source Routing,IP forwarding,Christmas tree packet,Processing delay,Distributed computing | Conference |
Citations | PageRank | References |
0 | 0.34 | 10 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Sangita Roy | 1 | 11 | 3.30 |
Ashok Singh Sairam | 2 | 43 | 10.83 |