IP Traceback Methodology Using Markov Chain and Bloom Filter in 802.16e

  • Authors:
  • Do Hoon Kim;Hoh Peter In;Byungsik Yoon

  • Affiliations:
  • -;-;-

  • Venue:
  • ICCIT '08 Proceedings of the 2008 Third International Conference on Convergence and Hybrid Information Technology - Volume 02
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recently, network resource is extremely vulnerable to DDoS attacks which has become a pressing problem due to scarce an efficient method to locate the real attacker. Especially, the more network topology advanced and complex such as 802.16e (WiBro), IP Traceback is difficult. According to, in this paper, the IP Traceback methodology using Markov Chain based on XOR operation is proposed in 802.16e. Also the paper provides a traceback method including: receiving data including access control router information according to a path of an attacker; filtering the data to hash the data, and storing the resultant hashed information; determining whether the data is normally received on the basis of the hashed information; and predicting a path loss on the basis of the determination result. Therefore, it is possible to perform an accurate IP traceback using a probabilistic packing marking method and a hash-based traceback method.