Title: Single packet IP traceback in AS-level partial deployment scenario

Authors: Turgay Korkmaz, Chao Gong, Kamil Sarac, Sandra G. Dykes

Addresses: Department of Computer Science, The University of Texas at San Antonio, 6900 North Loop 1604 West, San Antonio, TX 78249, USA. ' Department of Computer Science, The University of Texas at Dallas, 2601 N Floyd Road, Richardson, TX 75080, USA. ' Department of Computer Science, The University of Texas at Dallas, 2601 N Floyd Road, Richardson, TX 75080, USA. ' Communications and Embedded Systems Department, Southwest Research Institute, 6220 Culebra Road, San Antonio, TX 78238, USA

Abstract: Denial-of-Service (DoS) attacks commonly use IP spoofing to hide the identity and the location of the attack origin. To defend against various DoS attacks and make the attacker accountable, it is necessary to trace IP packets regardless of their source addresses. In this direction, log-based IP traceback is a promising and powerful approach due to its ability to traceback even a single packet. However, the global deployment of log-based IP traceback at all the routers in the internet requires a significant amount of modifications in the routers and introduces a serious operation and management overhead. To facilitate global deployment, we consider the Autonomous Systems (AS) level deployment of log-based IP traceback and accordingly propose a new mechanism called AS-level Single Packet Traceback (AS-SPT). We then evaluate the performance and overhead of the proposed AS-SPT under various partial deployment scenarios.

Keywords: single packet IP traceback; denial-of-service; DoS defence; DoS attacks; autonomous systems; partial deployment; networks; security.

DOI: 10.1504/IJSN.2007.012828

International Journal of Security and Networks, 2007 Vol.2 No.1/2, pp.95 - 108

Published online: 16 Mar 2007 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article