5.2 Open issues
While this scheme appears to be a promising
direction, we recognize that there are some issues to
be further addressed in the future. First, the 3SP is
not able to efficiently handle transformed attack
packets, second the authentication scheme must be
carefully chosen in order to maintain a good
performance while preserving a high level of
security for the overall signaling mechanism.
6 CONCLUSION
Denial of service attacks are a great threat that faces
the Internet today. Many solutions were proposed to
combat these attacks, including prevention,
detection, filtering and traceback solutions.
In this paper, we presented a signaling
architecture, which facilitates the traceback of
Internet attacks and in particular DDoS attacks, even
with concealment techniques such as IP spoofing.
The traceback mechanism can be easily coupled
with other defense mechanisms such as attack
detection and filtering, and thus constitutes a
fundamental part of global defense architecture.
The signaling protocol 3SP has the capability of
functioning properly even in the presence of non
3SP-capable routers, thus enabling incremental
deployment of the protocol itself.
An experimental implementation of the 3SP
protocol is currently in progress, in order to evaluate
its performances and test the different possible
authentication mechanisms.
REFERENCES
Bellovin, S.M., 2001. ICMP traceback messages, Internet
draft.
Bloom, B. H., 1970. Space/time tradeoffs in hash coding
with allowable errors. Communications of the ACM,
13(7):422– 426.
Burch, H., Cheswick, B., 2000. Tracing Anonymous
Packets to Their Approximate Source, in Proceedings
of the 14
th
USENIX Systems Administration
Conference.
CERT® Coordination Center, 1997. “Denial of Service
Attacks”. Available from:
http://www.cert.org/tech_tips/denial_of_service.html
Cisco Systems, 1999. Characterizing and Tracing Packet
Floods Using Cisco Routers.
Dean, D., Franklin, M., Stubblefield, A., 2001. An
algebraic approach to IP Traceback. In Proceedings of
the 2001 Network and Distributed System Security
Symposium.
Gil, T.M., Poleto, M., 2001. MULTOPS: a data-structure
for bandwidth attack detection, in Proceedings of 10th
Usenix Security Symposium.
Lee, S. C., Shields, C., 2001. Tracing the Source of
Network Attack: A Technical, Legal and Societal
Problem, in proceedings of the 2001 IEEE Workshop
on Information Assurance and Security.
Mankin, A., Massey, D., Wu, C., Wu, S. F., Zhang, L.,
2001. On Design and Evaluation of Intention-Driven
ICMP Traceback, In Proceedings of IEEE
International Conference on Computer
Communications and Networks.
Mirkovic, J., Prier, G., Reiher, P., 2002. Attacking DDoS
at the source. In Proceedings of ICNP 2002, pp. 312–
321
Park, K., Lee, H., 2001. On the Effectiveness of
Probabilistic Packet Marking for IP Traceback, In
Proceedings of IEEE INFOCOM 2001.
Paxon, V., 2001. An analysis of using reflectors for
distributed denial-of-service attacks. Computer
Communication Review.
Sanchez, L.A., Milliken, W.C., Snoeren, A.C.,
Tchakountio, F., Jones, C.E,. Kent, S.T., Partridge, C.,
Strayer, W.T., 2001. Hardware Support for a Hash-
Based IP Traceback, in Proceedings of DARPA
Information Survivability Conference & Exposition.
Savage, S., Wetherall, D., Karlin, A., Anderson, T., 2000.
Practical network support for IP Traceback, In
Proceedings of 2000 ACM SIGCOMM Conference.
Song, D. X., Perrig, A., 2001. Advanced and authenticated
marking schemes for IP Traceback, IEEE INFOCOM
2001.
Stein, L.D., Stewart, J.N., 2003. The World Wide Web
Security FAQ, v 1.7.
Stone, R., 2000. CenterTrack: An IP Overlay Network for
Tracking DoS Floods, In Proceedings of 9th Usenix
Security Symposium.
A SIGNALING ARCHITECTURE AGAINST DOS ATTACKS
221