Non-intrusive IP traceback for DDoS attacks
Author(s) -
Vrizlynn L. L. Thing,
Morris Sloman,
Naranker Dulay
Publication year - 2007
Publication title -
spiral (imperial college london)
Language(s) - English
Resource type - Conference proceedings
ISBN - 1-59593-574-6
DOI - 10.1145/1229285.1229331
Subject(s) - ip traceback , computer science , denial of service attack , computer network , application layer ddos attack , scalability , trinoo , the internet , computer security , database , operating system
30.11.12 KB. Accepted version ok to add to Spiral. ACMThe paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiting network routers. Under attack conditions, route anomalies are detected by determining which routers have been used for unknown source addresses, in order to construct the attack graph. Results of simulation studies are presented. Our approach does not require changes to the Internet routers or protocols. Precise information regarding the attack is not required allowing a wide variety of DDoS attack detection techniques to be used. Our algorithm is simple and efficient, allowing for a fast traceback and the scheme is scalable due to the distribution of processing workload. Copyright 2007 ACM
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom