STUDY ON IP TRACEBACK SYSTEM FOR DDoS

Cheol-Joo Chae, Bong-Han Kim, Jae-Kwang Lee

2008

Abstract

The rapid growth in technology has caused misuse of the Internet like cyber Crime. There are several vulnerabilities in current firewall and Intrusion Detection Systems (IDS) of the Network Computing resources. Automatic real time station chase techniques can track the internet invader and reduce the probability of hacking Due to the recent trends the station chase technique has become inevitable. In this paper, we design and implement IP traceback system. In this design no need to modify the router structure and we can deploy this technique in larger network. Our Implementation shows that IP traceback system is safe to deploy and protect data in Internet from hackers and others.

References

  1. Chun He, Formal Specifications of Traceback Marking Protocols, June 14, 2002.
  2. Steve Bellovin et al, ICMP Traceback messages, IETF Internet Draft draft-ietf-itrace-04.txt, Feb 2003.
  3. D. X. Song, A. Perrig, Advanced and Authenticated Marking Scheme for IP Traceback, Proc. Infocom Vol2, pp 878-886, 2001.
  4. S. Savage, D. Wetherall, A. karlin, and T. Anderson, Network Support for IPTraceback, IEEE/ACM transactions on networking, vol. 9, No. 3, June 2001.
  5. K. Park and H. Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, Proc. IEEE INFOCOM 01 pp 338-347, 2001.
  6. Stefan Savage et al, Practical network support for IP traceback, ACM SIGCOMM 2000.
  7. A.C Snoeren, C. Partride, L.A. Sanchez, W.T. Strayer. C.E. Jones. F. Tchakountio, and S.T. Kent, HashBased IP Traceback, BBN Technical Memorandum No.1284, February 7, 2001.
  8. Tatsuya Baba, Shigeyuki Matsuda, Tracing Network Attacks to Their Sources, IEEE Internet Computing, pp. 20-26, March, 2002.
Download


Paper Citation


in Harvard Style

Chae C., Kim B. and Lee J. (2008). STUDY ON IP TRACEBACK SYSTEM FOR DDoS . In Proceedings of the Tenth International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 978-989-8111-38-8, pages 279-282. DOI: 10.5220/0001702102790282


in Bibtex Style

@conference{iceis08,
author={Cheol-Joo Chae and Bong-Han Kim and Jae-Kwang Lee},
title={STUDY ON IP TRACEBACK SYSTEM FOR DDoS},
booktitle={Proceedings of the Tenth International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2008},
pages={279-282},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001702102790282},
isbn={978-989-8111-38-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Tenth International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - STUDY ON IP TRACEBACK SYSTEM FOR DDoS
SN - 978-989-8111-38-8
AU - Chae C.
AU - Kim B.
AU - Lee J.
PY - 2008
SP - 279
EP - 282
DO - 10.5220/0001702102790282