CFP last date
20 January 2025
Reseach Article

A Review of Packet Marking IP Traceback Schemes

by Ashwani Parashar, Ramaswami Radhakrishnan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 6
Year of Publication: 2013
Authors: Ashwani Parashar, Ramaswami Radhakrishnan
10.5120/11398-6704

Ashwani Parashar, Ramaswami Radhakrishnan . A Review of Packet Marking IP Traceback Schemes. International Journal of Computer Applications. 67, 6 ( April 2013), 15-20. DOI=10.5120/11398-6704

@article{ 10.5120/11398-6704,
author = { Ashwani Parashar, Ramaswami Radhakrishnan },
title = { A Review of Packet Marking IP Traceback Schemes },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 6 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 15-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number6/11398-6704/ },
doi = { 10.5120/11398-6704 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:23:57.078942+05:30
%A Ashwani Parashar
%A Ramaswami Radhakrishnan
%T A Review of Packet Marking IP Traceback Schemes
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 6
%P 15-20
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today, Internet has become the primary source of communication in networks. The attack on its infrastructure poses a great challenge in its expansion. Distributed Denial of Service attack is a serious security threat encountered during the past decade. The goal of the attacker is to spoof the source of IP address to hide its source. Various IP traceback schemes such as Probabilistic Packet Marking, Deterministic Packet marking, TTL base Packet Marking and Hash base IP traceback schemes are proposed to trace the source of the attacker. This paper summarizes the different IP traceback techniques and compares their effectiveness in countering DDoS attack.

References
  1. S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Network support for IP traceback,"IEEE/ACM Trans. Networking, vol. 9, pp. 226–237, June 2001.
  2. M. Alenezi, M. J. Reed, "IP traceback methodologies", Proceedings of IEEE conference in Computer Science and Electronic Engineering Conference (CEEC), 2011.
  3. Vaarun Vijairaghavan, Darshak Shah and Pallavi Galgali, Amit Shah and Nikhil Shah, Venkatesh Srinivasan, Lokesh Bhatia, "Marking Technique to Isolate Boundary Router and Attacker", IEEE Computer Society, 2007.
  4. M. Vijayalakshmi,Dr. S. Mercy Shalinie, A. Arun Pragash, "IP traceback system for network and application layer attacks", Proceedings of IEEE Conference on Recent Trends in Information Technology (ICRTIT),2012.
  5. R. Stone, "CenterTrack: An IP Overlay Network for Tracking DoS Floods", Proceeding of ACM SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, 2000.
  6. H. Burch and B. Cheswick, "Tracing Anonymous Packets to their Approximate Source", Proc. of the 14th Systems Administration Conference (LISA 2000).
  7. S. M. Bellovin. ICMP traceback messages. Internet draft: draft-bellovin-itrace-00. txt, Mar. 2000.
  8. Alex C. Snoeren, Craig Partridge, Christine E. Jones, Fabrice Tchakountio, Beverly Schwartz, Stephen T. Kent, Timothy Strayer, "Single-Packet IP Traceback", IEEE/ACM Transactions On Networking, Vol. 10, No. 6, December 2002.
  9. Bilal Rizvi and Emmanuel Femandez-Gaucherand, "Analysis of Adjusted Probabilistic Packet Marking" IEEE IPOM 2003.
  10. Hosoi Takurou, Kanta Matsuura, Hideki Hnai "IP Traceback by Packet Marking Method with Bloom Filters",Security Technology, 2007, 41st Annual IEEE International Carnahan Conference, October 2007. [11 ] Andrey Belenky and Nirwan Ansari, "IP Traceback With Deterministic Packet Marking", IEEE Communications Letters, Vol. 7, No. 4, April 2003.
  11. C. Shannon, D. Moore, and K. Claffy, "Characteristics of fragmented IP traffic on internet links," Proceeding IMW '01 Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, Pages 83-97,2001.
  12. Andrey Belenky and Nirwan Ansari, "Accommodating Fragmentation in Deterministic Packet Marking for IP Traceback", IEEE GLOBECOM 2003.
  13. C. Shannon, D. Moore, and K. C. Claffy, "Beyond folklore: observations on fragmented traffic," IEEE/ACM Trans. Networking, vol. 10, no. 6, pp. 709–720, Dec. 2002.
  14. Yang Xiang, Wanlei Zhou, and Minyi Guo, "Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks". IEEE Transactions on Parallel And Distributed Systems, Vol. 20, No. 4, April 2009.
  15. Chao Gong and Kamil Sarac, "A More Practical Approach for Single-Packet IP Traceback using Packet Logging and Marking", IEEE Transactions On Parallel and Distributed Systems, Vol. 19, No. 10, October 2008.
  16. Vamsi Paruchuri, Arjan Durresi and Sriram Chellappan, "TTL based Packet Marking for IP Traceback", Proceedings of IEEE "GLOBECOM", 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Traceback DDoS PPM DPM