Extension and Evaluation of IP Traceback Method Using Departure Stamp in Edge Router

Damage caused by illegal access to web sites is increasing with the growth of the Internet. In particular, denial of service (DoS) and distributed DoS (DDoS) attacks cause system downtime and often affect social life. To cope with these problems, the method known as “IP traceback using departure stamps” has been developed. Here, we propose three methods to improve traceability of this method and evaluate these methods through simulation.

[1]  Wanlei Zhou,et al.  Detecting and Tracing DDoS Attacks by Intelligent Decision Prototype , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[2]  Kamil Saraç,et al.  IP traceback based on packet marking and logging , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[3]  Chunfeng Huang,et al.  A Novel Deterministic Packet Marking Scheme for IP Traceback , 2008, 2008 Workshop on Power Electronics and Intelligent Transportation System.

[4]  Ion Stoica,et al.  Providing guaranteed services without per flow management , 1999, SIGCOMM '99.

[5]  Yau-Hwang Kuo,et al.  A table-driven approach for IP traceback based on network statistic analysis , 2009, 2009 11th International Conference on Advanced Communication Technology.

[6]  Amit Shah,et al.  Marking Technique to Isolate Boundary Router and Attacker , 2007, Computer.

[7]  D.N. Serpanos,et al.  Implementing filtering and traceback mechanism for packet-marking IP-traceback schemes against DDoS attacks , 2008, 2008 4th International IEEE Conference Intelligent Systems.

[8]  Choong Seon Hong,et al.  On IPv6 traceback , 2006, 2006 8th International Conference Advanced Communication Technology.

[9]  Vamsi Paruchuri,et al.  TTL Based Packet Marking for IP Traceback , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[10]  Sandhya Armoogum,et al.  Mobile Agents and Packet Marking for Real-Time IP Traceback , 2009, 2009 Third International Conference on Digital Society.

[11]  Jae-Kwang Lee,et al.  A Study of Defense DDoS Attacks Using IP Traceback , 2007, The 2007 International Conference on Intelligent Pervasive Computing (IPC 2007).

[12]  Yen-Wen Chen,et al.  An edge router-based fast internet traceback , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[13]  Jae-Kwang Lee,et al.  A Study of Defense DDoS Attacks Using IP Traceback , 2007 .