Investigating unique flow marking for tracing back DDoS attacks

In this paper, we outline the recent efforts of our research in defense against Distributed Denial of Service (DDoS) attacks. In particular, we present a novel approach to IP traceback, namely Unique Flow Marking (UFM), and we evaluate UFM against other marking schemes. Our results show that the UFM can reduce the number of marked packets compared to the other marking schemes, while achieving a better performance in terms of its ability to trace back the attack.

[1]  A. Nur Zincir-Heywood,et al.  IP traceback through (authenticated) deterministic flow marking: an empirical evaluation , 2013, EURASIP Journal on Information Security.

[2]  Craig Partridge,et al.  Single-packet IP traceback , 2002, TNET.

[3]  Nirwan Ansari,et al.  On IP traceback , 2003, IEEE Commun. Mag..

[4]  Dawn Xiaodong Song,et al.  FIT: fast Internet traceback , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[5]  A. Nur Zincir-Heywood,et al.  On Evaluating IP Traceback Schemes: A Practical Perspective , 2013, 2013 IEEE Security and Privacy Workshops.

[6]  A. Nur Zincir-Heywood,et al.  TDFA: Traceback-Based Defense against DDoS Flooding Attacks , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[7]  Nirwan Ansari,et al.  On deterministic packet marking , 2007, Comput. Networks.

[8]  S. Mercy Shalinie,et al.  Attack source identification at router level in real time using marking algorithm deployed in programmable routers , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[9]  M. Tech,et al.  RIHT: A Novel Hybrid IP Traceback Scheme , 2014 .

[10]  Anna R. Karlin,et al.  Network support for IP traceback , 2001, TNET.

[11]  A. Nur Zincir-Heywood,et al.  Deterministic and Authenticated Flow Marking for IP Traceback , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).