The Community for Technology Leaders
RSS Icon
Subscribe
San Francisco, CA
May 23, 2013 to May 24, 2013
ISBN: 978-1-4799-0458-7
pp: 127-134
ABSTRACT
This paper presents an evaluation of two promising schemes for tracing cyber-attacks, the well-known Deterministic Packet Marking, DPM, and a novel marking scheme for IP traceback, Deterministic Flow Marking, DFM. First of all we explore the DPM in detail and then by investigating the DFM, we analyze the pros and cons of both approaches in depth in terms of practicality and feasibility, so that shortcomings of each scheme are highlighted. This evaluation is based on CAIDA Internet traces October 2012 dataset. The results show that using DFM may reduce as many as 90% of marked packets on average required for tracing attacks with no false positives, while it eliminates the spoofed marking embedded by the attacker as well as compromised routers in the attack path. Moreover, unlike DPM that traces the attack up to the ingress interface of the edge router close to the attacker, DFM allows the victim to trace the origin of incorrect or spoofed source addresses up to the attacker node, even if the attack has been originated from a network behind a network address translation (NAT), firewall, or a proxy server.
INDEX TERMS
Flow Base IP Traceback; DDoS Attacks; Deterministic Flow Marking; Authenticated Flow Marking
CITATION
Vahid Aghaei-Foroushani, A. Nur Zincir-Heywood, "On Evaluating IP Traceback Schemes: A Practical Perspective", SPW, 2013, 2013 IEEE CS Security and Privacy Workshops (SPW2013), 2013 IEEE CS Security and Privacy Workshops (SPW2013) 2013, pp. 127-134, doi:10.1109/SPW.2013.13
35 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool