SlideShare uma empresa Scribd logo
1 de 19
Overview of Traceback Mechanism a
       nd Their Applicability
     IEICE Transactions on Information and Systems, Volume E94.D, Issue 11, pp. 2077-2086
                                                                                    (2011)




                    Heung-Youl Youm




                                                   Ibnu Mubarok – 2012.04.09
Introduction

• Goal of the paper
    – overview.
    – base understanding of existing traceback mechanism
•   IP Traceback
•   Taxonomy
•   Existing traceback mechanism
•   Comparison
•   Conclusion
IP Traceback

• Locate the origin of a packet.

• It’s complicated since IP address can be forged or
  spoofed.

• IP Traceback used only for identification of the sources
  of the offending packets during and after the attack.

• Mainly used to trace the DDoS, where the packet
  (attacker) came from.

• In general, IP traceback is not limited only to DoS and
  DDoS attacks.
Taxonomy

• Taxonomy of traceback in Autonomous System
   – Intra-AS
   – Inter-AS


• Capabilities of traceback
  mechanism

• Currently there are proposed
  standards being reviewed
  in ITU-T
Controlled Flooding

• Generating a burst of network traffic from the victim’s
  network to the upstream network segments.
• Observe the effect of this flooding.
• Flooding a link will cause all packets, including packets
  from the attacker, to be dropped with the same
  probability.
• if a given link were flooded, and packets from the
  attacker slowed, then this link must be part of the
  attack path.
• Do this recursively to upstream routers until the
  attack path is discovered.
• Only valid for DoS attacks
Controlled Flooding
Input Debugging

• Link-testing mechanism
• Already exist on many routers
• Router aware of common characteristic of the attack
  packet (signature)
• Repeated hop-by-hop at every upstream router in
  network until the source or another ISP is reached
Overlay Network – (Center Track)

• Forwards packets to a certain network point where
  they are monitored in the network




• The tracking router (TR) monitors all traffic that
  passes through the network.
Probabilistic Packet Marking

• Routers mark packets that pass through them with their
  addresses, a part of their addresses or edge (marking)
• Those modified packets are analyzed at the victim node
  for path reconstruction.
• This scheme is aimed primarily at DoS and DDoS attack
  as it needs many attack packets to reconstruct the full
  path.
• It use 16-bit identification field in IP header to store
  router’s address.
• Not every packet, but some packet with certain
  probability (ex 1/25)
Probabilistic Packet Marking
Deterministic Packet Marking

• Only the ingress router on the attack path marks
  every packet passing through it with its router
  IP address.
Packet Messaging - ICMP Traceback (iTrace)


• Every router on the network is pick a packet
  probabilistically and generate an ICMP traceback
  message directed to the same destination as the
  selected packet.
• The iTrace message consists of the next and previous
  hop information, and a timestamp
• TTL field is set to 255, and is then used to identify the
  actual path of the attack
Packet Messaging - ICMP Traceback
Packet Logging – (hash based)

• Packet Logging  Each router logs information
  (signature) of all IP packets that traverse through it 
  Enormous amount of storage space

• Stores 20 byte IPv4 header + 8 byte payload =
  28 byte packet information

• Using hash followed by Bloom filtering process 
  reduced size + provide privacy against eavesdropping

• Every router captures partial packet information of every
  packet that passes through the route, to be able in the
  future to determine if that packet passed through it.

• Three function in SPIE :
        •   STM
        •   SCAR
        •   DGA
Hybrid Traceback

• Combines the some traceback technique

• Packet Marking + Packet Logging

• Partially record network path information at routers
  and in packets.

• DLL ( Distributed Link-List ) : store, mark, forward

• Fixed size marking field is allocated in each packet.
Evaluation Criteria

•   Degree of ISP involvement
•   Number of packets required for traceback
•   Memory requirement
•   Processing overhead for traceback
•   Degree of bandwidth increase
•   Ability to handles massive DDoS attacks
•   Misuse by attacker
•   Knowledge of network topology
•   Robustness of traceback
•   Effect of partial deployment
•   Scalability
•   Number of functions needed to implement traceback
•   Capability to trace transformed packets
Comparison of IP Traceback Mechanism
Application of Traceback Mechanism
Conclusion

• Practical way to track the massive DDoS is to use a
  Traceback technique.

• For the problem of IP traceback, several solutions
  have been proposed. Each has its own advantages
  and disadvantages. No ideal scheme.

• Current technology has good Intrusion detection and
  prevention systems for protect system. Do we really
  need a ‘location’ of the attacker too? Is it only for Law
  enforcement and military people this traceback thing?

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Honeypots
HoneypotsHoneypots
Honeypots
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Security Threats at OSI layers
Security Threats at OSI layersSecurity Threats at OSI layers
Security Threats at OSI layers
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
 
Arp spoofing
Arp spoofingArp spoofing
Arp spoofing
 
How Hashing Algorithms Work
How Hashing Algorithms WorkHow Hashing Algorithms Work
How Hashing Algorithms Work
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Fuzzy expert systems
Fuzzy expert systemsFuzzy expert systems
Fuzzy expert systems
 
CREST CCT Exam Prep Notes
CREST CCT Exam Prep NotesCREST CCT Exam Prep Notes
CREST CCT Exam Prep Notes
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full report
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
CNS - Unit - 2 - Stream Ciphers and Block Ciphers
CNS - Unit - 2 - Stream Ciphers and Block CiphersCNS - Unit - 2 - Stream Ciphers and Block Ciphers
CNS - Unit - 2 - Stream Ciphers and Block Ciphers
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 

Destaque

Passive ip traceback disclosing the locations
Passive ip traceback disclosing the locationsPassive ip traceback disclosing the locations
Passive ip traceback disclosing the locations
jpstudcorner
 
aly hegazi CV
aly hegazi CV aly hegazi CV
aly hegazi CV
ALI khlifA
 
Résumé of Sarower Hossain Arif_30.11.2016
Résumé of Sarower Hossain Arif_30.11.2016Résumé of Sarower Hossain Arif_30.11.2016
Résumé of Sarower Hossain Arif_30.11.2016
Sarwer Hossain Arif
 

Destaque (18)

Passive ip traceback disclosing the locations
Passive ip traceback disclosing the locationsPassive ip traceback disclosing the locations
Passive ip traceback disclosing the locations
 
Tracing IP Addresses: Gary Kessler
Tracing IP Addresses: Gary KesslerTracing IP Addresses: Gary Kessler
Tracing IP Addresses: Gary Kessler
 
Web spoofing
Web spoofingWeb spoofing
Web spoofing
 
A Novel IP Traceback Scheme for Spoofing Attack
A Novel IP Traceback Scheme for Spoofing AttackA Novel IP Traceback Scheme for Spoofing Attack
A Novel IP Traceback Scheme for Spoofing Attack
 
Tracing an email by Amin Pathan
Tracing an email by Amin PathanTracing an email by Amin Pathan
Tracing an email by Amin Pathan
 
Everything You Need to Know About Increasing Donor and Board Member Engagemen...
Everything You Need to Know About Increasing Donor and Board Member Engagemen...Everything You Need to Know About Increasing Donor and Board Member Engagemen...
Everything You Need to Know About Increasing Donor and Board Member Engagemen...
 
Mapa conceptual.MAPA CONCEPTUAL.
Mapa conceptual.MAPA CONCEPTUAL.Mapa conceptual.MAPA CONCEPTUAL.
Mapa conceptual.MAPA CONCEPTUAL.
 
Web 2.0, Social Web - ist doch alles nur heiße Luft!
Web 2.0, Social Web - ist doch alles nur heiße Luft!Web 2.0, Social Web - ist doch alles nur heiße Luft!
Web 2.0, Social Web - ist doch alles nur heiße Luft!
 
aly hegazi CV
aly hegazi CV aly hegazi CV
aly hegazi CV
 
Target Audience Research
Target Audience ResearchTarget Audience Research
Target Audience Research
 
Résumé of Sarower Hossain Arif_30.11.2016
Résumé of Sarower Hossain Arif_30.11.2016Résumé of Sarower Hossain Arif_30.11.2016
Résumé of Sarower Hossain Arif_30.11.2016
 
Ref Usa Cheat Sheet
Ref Usa Cheat SheetRef Usa Cheat Sheet
Ref Usa Cheat Sheet
 
テストとは
テストとはテストとは
テストとは
 
会社評価サイトを通じた 新卒&第二新卒斡旋スマホアプリ
会社評価サイトを通じた新卒&第二新卒斡旋スマホアプリ会社評価サイトを通じた新卒&第二新卒斡旋スマホアプリ
会社評価サイトを通じた 新卒&第二新卒斡旋スマホアプリ
 
Articulo de Revision hemangioma nasal tip
Articulo de Revision hemangioma nasal tipArticulo de Revision hemangioma nasal tip
Articulo de Revision hemangioma nasal tip
 
Future of Wearable Tech 2014 (PSFK, IQ Intel)
Future of Wearable Tech 2014 (PSFK, IQ Intel)Future of Wearable Tech 2014 (PSFK, IQ Intel)
Future of Wearable Tech 2014 (PSFK, IQ Intel)
 
2° basico b semana del 25 al 29 de abril
2°  basico b  semana del 25  al 29 de abril2°  basico b  semana del 25  al 29 de abril
2° basico b semana del 25 al 29 de abril
 
Joint Session Current and Future Potential of Video in Car Dealerships
Joint Session Current and Future  Potential of Video in  Car DealershipsJoint Session Current and Future  Potential of Video in  Car Dealerships
Joint Session Current and Future Potential of Video in Car Dealerships
 

Semelhante a Overview of IP traceback mechanism

Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks
Sasank Chaitanya
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
Cengage Learning
 
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijripublishers Ijri
 

Semelhante a Overview of IP traceback mechanism (20)

Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensics
 
IDS Evasion Techniques
IDS Evasion TechniquesIDS Evasion Techniques
IDS Evasion Techniques
 
Basics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networksBasics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networks
 
Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks
 
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet MulticastingNP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
 
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERSVTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
 
IP Multicast Routing
IP Multicast RoutingIP Multicast Routing
IP Multicast Routing
 
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Network security
 Network security Network security
Network security
 
Isys20261 lecture 06
Isys20261 lecture 06Isys20261 lecture 06
Isys20261 lecture 06
 
Chapter 4 internetworking [compatibility mode]
Chapter 4   internetworking [compatibility mode]Chapter 4   internetworking [compatibility mode]
Chapter 4 internetworking [compatibility mode]
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
1.SNORT.pdf
1.SNORT.pdf1.SNORT.pdf
1.SNORT.pdf
 
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo -  Guide to Building Secure InfrastructuresPLNOG 8: Merike Kaeo -  Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Overview of IP traceback mechanism

  • 1. Overview of Traceback Mechanism a nd Their Applicability IEICE Transactions on Information and Systems, Volume E94.D, Issue 11, pp. 2077-2086 (2011) Heung-Youl Youm Ibnu Mubarok – 2012.04.09
  • 2. Introduction • Goal of the paper – overview. – base understanding of existing traceback mechanism • IP Traceback • Taxonomy • Existing traceback mechanism • Comparison • Conclusion
  • 3. IP Traceback • Locate the origin of a packet. • It’s complicated since IP address can be forged or spoofed. • IP Traceback used only for identification of the sources of the offending packets during and after the attack. • Mainly used to trace the DDoS, where the packet (attacker) came from. • In general, IP traceback is not limited only to DoS and DDoS attacks.
  • 4. Taxonomy • Taxonomy of traceback in Autonomous System – Intra-AS – Inter-AS • Capabilities of traceback mechanism • Currently there are proposed standards being reviewed in ITU-T
  • 5. Controlled Flooding • Generating a burst of network traffic from the victim’s network to the upstream network segments. • Observe the effect of this flooding. • Flooding a link will cause all packets, including packets from the attacker, to be dropped with the same probability. • if a given link were flooded, and packets from the attacker slowed, then this link must be part of the attack path. • Do this recursively to upstream routers until the attack path is discovered. • Only valid for DoS attacks
  • 7. Input Debugging • Link-testing mechanism • Already exist on many routers • Router aware of common characteristic of the attack packet (signature) • Repeated hop-by-hop at every upstream router in network until the source or another ISP is reached
  • 8. Overlay Network – (Center Track) • Forwards packets to a certain network point where they are monitored in the network • The tracking router (TR) monitors all traffic that passes through the network.
  • 9. Probabilistic Packet Marking • Routers mark packets that pass through them with their addresses, a part of their addresses or edge (marking) • Those modified packets are analyzed at the victim node for path reconstruction. • This scheme is aimed primarily at DoS and DDoS attack as it needs many attack packets to reconstruct the full path. • It use 16-bit identification field in IP header to store router’s address. • Not every packet, but some packet with certain probability (ex 1/25)
  • 11. Deterministic Packet Marking • Only the ingress router on the attack path marks every packet passing through it with its router IP address.
  • 12. Packet Messaging - ICMP Traceback (iTrace) • Every router on the network is pick a packet probabilistically and generate an ICMP traceback message directed to the same destination as the selected packet. • The iTrace message consists of the next and previous hop information, and a timestamp • TTL field is set to 255, and is then used to identify the actual path of the attack
  • 13. Packet Messaging - ICMP Traceback
  • 14. Packet Logging – (hash based) • Packet Logging  Each router logs information (signature) of all IP packets that traverse through it  Enormous amount of storage space • Stores 20 byte IPv4 header + 8 byte payload = 28 byte packet information • Using hash followed by Bloom filtering process  reduced size + provide privacy against eavesdropping • Every router captures partial packet information of every packet that passes through the route, to be able in the future to determine if that packet passed through it. • Three function in SPIE : • STM • SCAR • DGA
  • 15. Hybrid Traceback • Combines the some traceback technique • Packet Marking + Packet Logging • Partially record network path information at routers and in packets. • DLL ( Distributed Link-List ) : store, mark, forward • Fixed size marking field is allocated in each packet.
  • 16. Evaluation Criteria • Degree of ISP involvement • Number of packets required for traceback • Memory requirement • Processing overhead for traceback • Degree of bandwidth increase • Ability to handles massive DDoS attacks • Misuse by attacker • Knowledge of network topology • Robustness of traceback • Effect of partial deployment • Scalability • Number of functions needed to implement traceback • Capability to trace transformed packets
  • 17. Comparison of IP Traceback Mechanism
  • 19. Conclusion • Practical way to track the massive DDoS is to use a Traceback technique. • For the problem of IP traceback, several solutions have been proposed. Each has its own advantages and disadvantages. No ideal scheme. • Current technology has good Intrusion detection and prevention systems for protect system. Do we really need a ‘location’ of the attacker too? Is it only for Law enforcement and military people this traceback thing?

Notas do Editor

  1. The ISP has to perform a traceback as well as identify the attack completely on its own.
  2. THIS