Tracers placement for IP traceback against DDoS attacks

  • Authors:
  • Chun-Hsin Wang;Chang-Wu Yu;Chiu-Kuo Liang;Kun-Min Yu;Wen Ouyang;Ching-Hsien Hsu;Yu-Guang Chen

  • Affiliations:
  • Chung Hua University, Hsin Chu, Taiwan, R.O.C.;Chung Hua University, Hsin Chu, Taiwan, R.O.C.;Chung Hua University, Hsin Chu, Taiwan, R.O.C.;Chung Hua University, Hsin Chu, Taiwan, R.O.C.;Chung Hua University, Hsin Chu, Taiwan, R.O.C.;Chung Hua University, Hsin Chu, Taiwan, R.O.C.;Chung Hua University, Hsin Chu, Taiwan, R.O.C.

  • Venue:
  • Proceedings of the 2006 international conference on Wireless communications and mobile computing
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper explores the tracers deployment problem for IP traceback methods how many and where the tracers should be deployed in the network to be effective for locating the attack origins. The minimizing the number of tracers deployment problems depended on locating the attack origins are defined. The problem is proved to be NP-complete. A heuristic method which can guarantee that the distance between any attack origin and its first met tracer be within an assigned distance is proposed. The upper bound for the probability of an undetected attack node can be calculated in advance and used to evaluate the number of tracers needed for the proposed heuristic method. Extended simulations are performed to study the performance of the tracers deployment.