2015 IEEE 40th Conference on Local Computer Networks (LCN 2015) (2015)
Clearwater Beach, FL, USA
Oct. 26, 2015 to Oct. 29, 2015
Peter Hillmann , Universität der Bundeswehr München, Neubiberg, 85577, GERMANY
Frank Tietze , Universität der Bundeswehr München, Neubiberg, 85577, GERMANY
Gabi Dreo Rodosek , Universität der Bundeswehr München, Neubiberg, 85577, GERMANY
The identification of the exact path that packets are routed on in the network is quite a challenge. This paper presents a novel, efficient traceback strategy named Tracemax in context of a defense system against distributed denial of service (DDoS) attacks. A single packet can be directly traced over many more hops than the current existing techniques allow. In combination with a defense system it differentiates between multiple connections. It aims to letting non-malicious connections pass while bad ones get thwarted. The novel concept allows detailed analyses of the traffic and the transmission path through the network. The strategy can effectively reduce the effect of common bandwidth and resource consumption attacks, foster early warning and prevention as well as higher the availability of the network services for the wanted customers.
IP networks, Ports (Computers), Computer crime, Labeling, Routing, Reconstruction algorithms, Bandwidth
P. Hillmann, F. Tietze and G. D. Rodosek, "Tracemax: A novel single packet IP traceback strategy for data-flow analysis," 2015 IEEE 40th Conference on Local Computer Networks (LCN 2015)(LCN), Clearwater Beach, FL, USA, 2015, pp. 177-180.