Step 4. Server system denies the flow of packets
that are forwarded to victim system.
Step 5. Server System analyzes traceback packet
included in iTrace message that are received
from Agent system and begin traceback. First,
Server system check validate of iTrace Message
using secrete key(k
n
)
Step 6. Server system chose iTrace that have
maximum Timestamp. And Server system store
RouterID, Backward Link, Forward Link.
Step 7. Find iTrace Message that have Forward
connect to Forward Link and establish traceback
path.
Step 8. Repeate step 6, step 7 until do not
connect to iTrace Message.
Step 9. Server System make complete traceback
path. Traceback attack source.
Figure 9 shows result of IP traceback. In figure
10, we sure do not cause much traffic than PPM
packet of basis by way that transmit creating iTrace
Message about something wrong packet, and also do
not create traffic that iTrace Message can bear to
whole network.
[ 공격 근원지 탐색정보]
Source1 IP : 203.247.47.65
Source2 IP : 203.247.47.66
Source3 IP : 203.247.47.67
Source4 IP : 203.247.47.68
Source5 IP : 203.247.47.69
Network : 203.247.47.0
Attack Type1 : TCP SYN flood
Attack Type2 : TCP SYN flood
Attack Type3 : TCP SYN flood
Total Attack Traffic : 356,446/s
[ 공격 근원지 탐색정보]
Source1 IP : 203.247.47.65
Source2 IP : 203.247.47.66
Source3 IP : 203.247.47.67
Source4 IP : 203.247.47.68
Source5 IP : 203.247.47.69
Network : 203.247.47.0
Attack Type1 : TCP SYN flood
Attack Type2 : TCP SYN flood
Attack Type3 : TCP SYN flood
Total Attack Traffic : 356,446/s
[ 공격 피해 시스템 정보]
Victim IP : 211.101.95.59
Attack Type : TCP SYN f lood
Network : 211.101.95.0
Attack Time(term) : 01:00.18
Total Attack Traffic : 356,446/s
[ 공격 피해 시스템 정보]
Victim IP : 211.101.95.59
Attack Type : TCP SYN f lood
Network : 211.101.95.0
Attack Time(term) : 01:00.18
Total Attack Traffic : 356,446/s
Figure 9: IP Traceback analyzes Attacker and Victim.
Figure 10: Analysis packet traffic.
4 CONCLUSIONS
IP Traceback is an important technique to traceback
attack source address. Many techniques have been
proposed but all these techniques have a problem
when applied in internet environment. As, it is not
easy to load programming module into router, we
use linux system as the administrator can access
linux router. We design and implement IP Traceback
system that uses iTrace message, which can be
applied in internet environment. We use
authentication/non-authentication host DB for
protecting network hosts from attacker and also due
fall in traffic rate. We use iTrace message (draft-ietf-
itrace-04) that is undergoing advancement due to
iTrace message’s standardization. Future work is to
concentrate on how to implement IP Traceback
system in ubiquitous environment.
ACKNOWLEDGEMENTS
This research was supported by the MKE(Ministry
of Knowledge Economy), Korea, under the ITRC
(Information Technology Research Center) support
program supervised by the IITA(Institute of
Information Technology Assessment) (IITA-2008-
C1090-0801-0027)".
REFERENCES
Chun He, Formal Specifications of Traceback Marking
Protocols, June 14, 2002.
Steve Bellovin et al, ICMP Traceback messages, IETF
Internet Draft draft-ietf-itrace-04.txt, Feb 2003.
D. X. Song, A. Perrig, Advanced and Authenticated
Marking Scheme for IP Traceback, Proc. Infocom
Vol2, pp 878-886, 2001.
S. Savage, D. Wetherall, A. karlin, and T. Anderson,
Network Support for IPTraceback, IEEE/ACM
transactions on networking, vol. 9, No. 3, June 2001.
K. Park and H. Lee, On the effectiveness of probabilistic
packet marking for IP traceback under denial of
service attack, Proc. IEEE INFOCOM 01 pp 338-347,
2001.
Stefan Savage et al, Practical network support for IP
traceback, ACM SIGCOMM 2000.
A.C Snoeren, C. Partride, L.A. Sanchez, W.T. Strayer.
C.E. Jones. F. Tchakountio, and S.T. Kent, Hash-
Based IP Traceback, BBN Technical Memorandum
No.1284, February 7, 2001.
Tatsuya Baba, Shigeyuki Matsuda, Tracing Network
Attacks to Their Sources, IEEE Internet Computing,
pp. 20-26, March, 2002.
ICEIS 2008 - International Conference on Enterprise Information Systems
282