Analysis of traceback techniques

  • Authors:
  • Udaya Kiran Tupakula;Vijay Varadharajan

  • Affiliations:
  • Information and Networked Systems Security Research, Division of ICS, Macquarie University, North Ryde, NSW, Australia;Information and Networked Systems Security Research, Division of ICS, Macquarie University, North Ryde, NSW, Australia

  • Venue:
  • ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Today's Internet is extremely vulnerable to Distributed Denial of service (DDoS) attacks. There is tremendous pressure on the sites performing online business and ISP's to protect their networks from DDoS attacks. Recently, several novel traceback techniques have been proposed to trace the approximate spoofed source of attack. Each proposed traceback technique has some unique advantages and disadvantages over the others. In this paper we will consider some of the novel traceback techniques and focus our discussion i) to raise some of the real time issues that can be addressed in the further research and ii) from the attackers perspective on how to generate DDoS attacks and remain untraced even if any of the traceback technique is deployed in the Internet. We will also demonstrate how attacks can be further amplified if ICMP traceback technique is deployed in the Internet and discuss techniques to minimise the additional attack traffic. We believe that the networks tend to become complex and more vulnerable to DDoS attacks if some of the proposed traceback techniques are deployed in the Internet.