IP Traceback: A New Denial-of-Service Deterrent?
IEEE Security and Privacy
CAPTRA: coordinated packet traceback
Proceedings of the 5th international conference on Information processing in sensor networks
Coloring the Internet: IP Traceback
ICPADS '06 Proceedings of the 12th International Conference on Parallel and Distributed Systems - Volume 1
Survey of network-based defense mechanisms countering the DoS and DDoS problems
ACM Computing Surveys (CSUR)
A practical and robust inter-domain marking scheme for IP traceback
Computer Networks: The International Journal of Computer and Telecommunications Networking
Performance analysis of probabilistic packet marking in IPv6
Computer Communications
Scalable traceback against distributed denial of service
International Journal of Web and Grid Services
Vulnerabilities in distance-indexed IP traceback schemes
International Journal of Security and Networks
A general model of probabilistic packet marking for IP traceback
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Fast autonomous system traceback
Journal of Network and Computer Applications
Towards behavioral control in multi-player network games
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Unified defense against DDoS attacks
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
DDoS mitigation in non-cooperative environments
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
Tracing the true source of an IPv6 datagram using policy based management system
APNOMS'06 Proceedings of the 9th Asia-Pacific international conference on Network Operations and Management: management of Convergence Networks and Services
A lightweight IP traceback mechanism on IPv6
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
A distributed network architecture for robust internet voting systems
EGOV'05 Proceedings of the 4th international conference on Electronic Government
Hi-index | 0.00 |
To identify sources of distributed denial-of-service attacks,path traceback mechanisms have been proposed. Tracebackmechanisms relying on probabilistic packet marking (PPM) havereceived most attention, as they are easy to implement and deployincrementally. In this paper, we introduce a new concept, namelyGroups Of Strongly SImilar Birthdays (GOSSIB 1 ), that can be usedby to obtain effects similar to a successful birthday attack on PPMschemes. The original and most widely known IP traceback mechanism,compressed edge fragment sampling (CEFS), was developedby Savage et al. [SWKA00]. We analyze the effects of an attackerusing GOSSIB against CEFS and show that the attacker can seedmisinformation much more efficiently than the network is able tocontribute real traceback information. Thus, GOSSIB will renderPPM effectively useless. It can be expected that GOSSIB has similareffects on other PPM traceback schemes and that standardmodifications to the systems will not solve the problem.