Authenticated Autonomous System Traceback

  • Authors:
  • Vamsi Paruchuri;Arjan Durresi;Rajgopal Kannan;S. Sitharama Iyengar

  • Affiliations:
  • -;-;-;-

  • Venue:
  • AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
  • Year:
  • 2004

Quantified Score

Hi-index 0.01

Visualization

Abstract

The design of the IP protocol makes it difficult toreliably identify the originator of an IP packet making thedefense against Distributed Denial of Service attacks oneof the hardest problems on the Internet today. Previoussolutions for this problem try to traceback to the exactorigin of the attack by requiring every router'sparticipation. For many reasons this requirement isimpractical and the victim ends up with an approximatelocation of the attacker. Reconstruction of the whole pathis also very difficult owing to the sheer size of theInternet.This paper presents lightweight schemes for tracingback to the attack-originating AS instead to the exactorigin itself. Once the attack-originating AS isdetermined, all further routers in the path to the attackerare within that AS and under the control of a singleentity; which can presumably monitor local traffic in amore direct way than a generalized, Internet scale, packetmarking scheme can. We also provide a scheme toprevent compromised routers from forging markings.