Single packet IP traceback in AS-level partial deployment scenario

  • Authors:
  • Turgay Korkmaz;Chao Gong;Kamil Sarac;Sandra G. Dykes

  • Affiliations:
  • Department of Computer Science, The University of Texas at San Antonio, 6900 North Loop 1604 West, San Antonio, TX 78249, USA.;Department of Computer Science, The University of Texas at Dallas, 2601 N Floyd Road, Richardson, TX 75080, USA.;Department of Computer Science, The University of Texas at Dallas, 2601 N Floyd Road, Richardson, TX 75080, USA.;Communications and Embedded Systems Department, Southwest Research Institute, 6220 Culebra Road, San Antonio, TX 78238, USA

  • Venue:
  • International Journal of Security and Networks
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Denial-of-Service (DoS) attacks commonly use IP spoofing to hide the identity and the location of the attack origin. To defend against various DoS attacks and make the attacker accountable, it is necessary to trace IP packets regardless of their source addresses. In this direction, log-based IP traceback is a promising and powerful approach due to its ability to traceback even a single packet. However, the global deployment of log-based IP traceback at all the routers in the internet requires a significant amount of modifications in the routers and introduces a serious operation and management overhead. To facilitate global deployment, we consider the Autonomous Systems (AS) level deployment of log-based IP traceback and accordingly propose a new mechanism called AS-level Single Packet Traceback (AS-SPT). We then evaluate the performance and overhead of the proposed AS-SPT under various partial deployment scenarios.