Open Access Open Access  Restricted Access Subscription or Fee Access

Qualitative Comparison of 2-Dimensional and 3-Dimensional Directed Geographical IP Traceback with Generalization to N Directions

A. Rajiv Kannan, Dr. K. Duaraiswamy, E. Sasikala

Abstract


Several IP traceback schemes have been proposed to trace DoS/DDoS attacks that abuse the internet. A mechanism for IP traceback based on the geographic information rather than the traditional IP address information was proposed in [1], for 8 directions is a planar environment. Extension of this two dimensional directed geographical traceback to 2n [n≥4] directions is also available [2]. In this paper, the DGT scheme has been compared from 2 dimensional to 3 dimensional while considering all routers from the surface of the earth to the atmosphere with reality. The 2 dimension, though not having exactly equal interface, have nearly equal measures, and are identified using a novel scheme of Segment Direction Ratios (SDR). The SDR concept and the associated marking scheme allow the victim to defend against DDoS attacks independent of its ISP and also the generalization to DGT2n, having 2n directions (n>4). All the advantages (like robustness, fast convergence, independence etc.,) of the two dimensional DGT are available in the three dimensional scheme as well. The basic assumptions about the traffic and the network are the same as in [1].


Keywords


DDoS, DoS, DGT (Directed Geographical traceback), DRA (Direction Ratio Algorithm), DRS (Direction Ratio Set), IP traceback, SDR (Segment Direction Ratio).

Full Text:

PDF

References


Zhiqiang Gao and Nirwan Ansari. “Directed Geographical Traceback”, IEEE, transactions. IEEE paper, 2005, pp. 221-224.

S. Savage, D. Wetherall, etc., “Practical Network Support for IP Traceback” IEEE / ACM transactions. Networking Vol 9, June 2001, pp. 226 – 237.

D. X. Song, and A. Perrig, “Advanced and Authenticated Marking Schemes for IP Traceback”, IEEE INFOCOM’01 Anchorage AK, AP 2001, pp 878 – 886.

A. Yaar etc., “FTT : Fast Internet Trackback”., IEEE INFOCOM’05, Miami, Florida, Mar. 2005.

Basheer Al-Duwairi etc., “Novel Hybrid Schemes Employing Packet Marking and bagging for IP Traceback”, IEEE Transactions on Parallel and Distribution Systems”, Vol 17. No5, May 2006, pp. 403 – 418.

Al – Duwairi B., etc., “Topology Based Packet Marking”, IEEE int. Conf. Computer comm.. and Networks (ICCN) Oct. 2004.

V. Padmanaban and L. Subramanian., “An Investigation of Geographic Mapping Technologies for Internet Hosts”, ACM SIGCOMM01. San Diego., 2001, pp. 173 – 185.

A. Rajiv Kannan, Dr. K. Duraiswamy, etc., ”16 directional DGT with generalization to 2n (n>4) directions”., IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 11, Nov 2008.

CERT, “Computer emergency response team, CERT advisory ca-2000-2001: Denial-of- service development http://www. cert. org/advisorees/CA-2000-01, html, 2000.

V. Padmanahan., etc., “Determining the geographic location of internet hosts,” ACMSIGMETRICS’01; Cambridge, MA., June 2001, pp 324-325.

P. Ferguson etc., “Network ingress filtering: defeating DOS attacks which employ IP source address spoofing”, RFC 2267, Jan 1998.

R. Govindan etc, “Heuristics for internet map discovery”, Proceedings of IEEE INFOCOM conference., Tel Aviv., Israel. March 2000.

T. Baba and S. Matsuda., “Tracing network attacks to their sources “., Proe. conf IEEE internet computing., Vol 6., No:2, 2002, pp. 20-26.

Stefan Savage, David Moore, Geoffrey M. Voelker, Inferring internet denial-of-service activity, Computer Security Institute & Federal Bureau of investigation, USENIX Association Berkeley, CA, USA Mar1999, pp. 2-2.

[SWKA00] Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson. “Practical network support for IP traceback”. Proceedings of the 2000 ACM SIGCOMM Conference, August 2000.

Stanford-chen. S, Heberlein, L. T “Holding Intruders accountable on the Internet”, IEEE proceedings of symposium on Security and Privacy.Oakland. CA May 1995, pp. 39-49.

Basheer Al-Duwairi, Manimaran Govindarasu, ” Novel Hybrid Schemes Employing Packet Marking and Logging for IP Traceback” IEEE transactions on Parallel and Distributed Systems, vol. 17, no. 5, May 2006.

W. Feller., ‘An Introduction to Probability theory and its applications (3rd edition)., Vol I, Wiley and sons. 1966, pp33-122.

S Derring, R. Hinden ; Internet protocol; Version 6 (IPV6); 2nd Edition, RFC Editor USA, RFC 2460; Dec 1998, pp17-188.

Alex C. Snoeren, Craig Patridge, “Single-packet IP-Traceback”, IEEE / ACM transactions on Networks, vol-10, issue-6, Dec-2002, pp. 721-734


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.