Simulation of IP Traceback for the Denial of Service Attack

In recent years, DoS attacks are becoming more serious in security of the Internet. They are rather easy to implement, but difficult to prevent. Therefore, tracing to the attackers and punishing them is considered to be an effective means against the attacks. Several tracing mechanisms have been proposed and analyzed for simplified models. This paper describes a simulation method for two network models, ICMP traceback (iTrace) and IP marking traceback (IP marking). This method modifies the OPNET to add the tracing codes. Also described is the results of simulation experiments, which indicate the effectiveness of the method.

[1]  Craig Partridge,et al.  Hash-based IP traceback , 2001, SIGCOMM.

[2]  Vrizlynn L. L. Thing,et al.  ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback , 2003, ICICS.

[3]  Heejo Lee,et al.  On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[4]  Youki Kadobayashi,et al.  Performance evaluation of inter-domain IP traceback , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..

[5]  Anna R. Karlin,et al.  Practical network support for IP traceback , 2000, SIGCOMM.

[6]  Steven M. Bellovin,et al.  ICMP Traceback Messages , 2003 .

[7]  Dawn Xiaodong Song,et al.  Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).