DDoS defense with IP traceback and path identification

A novel idea to combine both IP traceback and path identification(Pi) was proposed,and malicious packets could be identified and filtered at located upstream nodes.Then a practical packet marking and filtering scheme was proposed.The nodes along the path out of the destination domain deployed Pi.Mea...

Full description

Saved in:
Bibliographic Details
Main Authors: JIN Guang, ZHANG Fei, QIAN Jiang-bo, ZHANG Hong-hao
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2011-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74418705/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537797573312512
author JIN Guang
ZHANG Fei
QIAN Jiang-bo
ZHANG Hong-hao
author_facet JIN Guang
ZHANG Fei
QIAN Jiang-bo
ZHANG Hong-hao
author_sort JIN Guang
collection DOAJ
description A novel idea to combine both IP traceback and path identification(Pi) was proposed,and malicious packets could be identified and filtered at located upstream nodes.Then a practical packet marking and filtering scheme was proposed.The nodes along the path out of the destination domain deployed Pi.Meanwhile the border router of the destination domain deployed the traceback marking scheme.The victim could retrieve related information from arrived malicious packets.Then Pi-based filtering could be implemented at the border ingresses.A practical marking,storing and filtering scheme was provided in detail.The results of large-scale simulations with authoritative Internet topologies show the scheme is effective to alleviate attack impacts on the victim and upstream links in the destination domain.
format Article
id doaj-art-79f722309b4d4f5093c16d478e0f0ef9
institution Kabale University
issn 1000-436X
language zho
publishDate 2011-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-79f722309b4d4f5093c16d478e0f0ef92025-01-14T08:22:52ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2011-01-0132616774418705DDoS defense with IP traceback and path identificationJIN GuangZHANG FeiQIAN Jiang-boZHANG Hong-haoA novel idea to combine both IP traceback and path identification(Pi) was proposed,and malicious packets could be identified and filtered at located upstream nodes.Then a practical packet marking and filtering scheme was proposed.The nodes along the path out of the destination domain deployed Pi.Meanwhile the border router of the destination domain deployed the traceback marking scheme.The victim could retrieve related information from arrived malicious packets.Then Pi-based filtering could be implemented at the border ingresses.A practical marking,storing and filtering scheme was provided in detail.The results of large-scale simulations with authoritative Internet topologies show the scheme is effective to alleviate attack impacts on the victim and upstream links in the destination domain.http://www.joconline.com.cn/zh/article/74418705/network scurityDDoS attacksdefensedeterministic packet markingfiltering
spellingShingle JIN Guang
ZHANG Fei
QIAN Jiang-bo
ZHANG Hong-hao
DDoS defense with IP traceback and path identification
Tongxin xuebao
network scurity
DDoS attacks
defense
deterministic packet marking
filtering
title DDoS defense with IP traceback and path identification
title_full DDoS defense with IP traceback and path identification
title_fullStr DDoS defense with IP traceback and path identification
title_full_unstemmed DDoS defense with IP traceback and path identification
title_short DDoS defense with IP traceback and path identification
title_sort ddos defense with ip traceback and path identification
topic network scurity
DDoS attacks
defense
deterministic packet marking
filtering
url http://www.joconline.com.cn/zh/article/74418705/
work_keys_str_mv AT jinguang ddosdefensewithiptracebackandpathidentification
AT zhangfei ddosdefensewithiptracebackandpathidentification
AT qianjiangbo ddosdefensewithiptracebackandpathidentification
AT zhanghonghao ddosdefensewithiptracebackandpathidentification