Non-intrusive IP Traceback for DDoS Attacks
File(s)ASIACCS2007_Traceback.pdf (61.6 KB)
Accepted version
Author(s)
Thing, V
Sloman, M
Dulay, N
Type
Conference Paper
Abstract
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiting network routers. Under attack conditions, route anomalies are detected by determining which routers have been used for unknown source addresses, in order to construct the attack graph. Results of simulation studies are presented. Our approach does not require changes to the Internet routers or protocols. Precise information regarding the attack is not required allowing a wide variety of DDoS attack detection techniques to be used. Our algorithm is simple and efficient, allowing for a fast traceback and the scheme is scalable due to the distribution of processing workload
Date Issued
2007-03
Citation
2007, pp.371-373
Publisher
ACM
Start Page
371
End Page
373
Copyright Statement
© ACM, 2007. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security (2007) http://doi.acm.org/10.1145/1229285.1229331
Description
30.11.12 KB. Accepted version ok to add to Spiral. ACM
Identifier
http://www1.i2r.a-star.edu.sg/~vriz/Publications/ASIACCS2007_Traceback.pdf
Source
ACM symposium on Information, Computer and Communications Security, Singapore
Source Place
Singapore
Start Date
2007-03-20
Finish Date
2007-03-22
Coverage Spatial
Singapore