Intra-domain IP traceback using OSPF

  • Authors:
  • André Castelucio;Antônio Tadeu A. Gomes;Artur Ziviani;Ronaldo M. Salles

  • Affiliations:
  • LNCC - National Laboratory for Scientific Computing, Av.Getúlio Vargas, 333 - 25651-075 - Petrópolis, RJ, Brazil;LNCC - National Laboratory for Scientific Computing, Av.Getúlio Vargas, 333 - 25651-075 - Petrópolis, RJ, Brazil;LNCC - National Laboratory for Scientific Computing, Av.Getúlio Vargas, 333 - 25651-075 - Petrópolis, RJ, Brazil;IME - Military Institute of Engineering, Praça General Tibúrcio, 80 - 22290-270 - Rio de Janeiro, RJ, Brazil

  • Venue:
  • Computer Communications
  • Year:
  • 2012

Quantified Score

Hi-index 0.25

Visualization

Abstract

Denial of service (DoS) attacks are a serious threat to the appropriate operation of services within network domains. In this paper, we propose a system called OsTraS (OSPF-based Traceback System) that helps network operators to deal with this threat by creating an overlay network for intra-domain IP traceback. The main contribution of our proposal with respect to previous work is its ability to provide partial and progressive deployment of the traceback system throughout a monitored network domain. The OsTraS system builds its overlay network using the OSPF routing protocol through the definition of an Opaque LSA (Link State Advertisement) specially conceived for this purpose. We investigate and evaluate the performance of partial and progressive deployment of the proposed system, showing its suitability even for large network domains.