The Improvement Scheme Based on SIPT

Article Preview

Abstract:

Speedy IP Traceback method (SIPT) is deficient in monitoring and position attack sources, this paper puts forward an improvement scheme based on SIPT, it only marks two-three times for the packet on the key locations, and the propose also overload rarely used fields on IP packet header to store the checkpoint information, which can traceback the attack source use these marking information, which would help to attack path-reconstruction with a low false-positive rate as a guid.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3721-3723

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Vaarun Vijairaghavan, Darshak Shah, Pallavi Galgali, Amit Shah, Nikhil Shah, Venkatesh Srinivasan, Marking Technique toIsolate Boundary Router and Attacker, Computer, vol 2, pp.54-58. Feb (2007).

DOI: 10.1109/mc.2007.66

Google Scholar

[2] LAUFER R P, VELLOSO PB, DUAKRTE O C M B. Generalized Bloom Filters [R]. Coppe/UFRJ, Tech Rep GTA-05-43, (2005).

Google Scholar

[3] Masayuki Okada, Yasuharu Katsuno, Akira Kanaoka and Eiji Okamoto, 32-bit AS Number Based IP Traceback,. IEEE Computer Society Washington, DC, USA, pp.628-633, July (2011).

DOI: 10.1109/imis.2011.95

Google Scholar

[4] Stefan Savage, David Wetherall, Anna Karlin, Tom Anderson, Practical network support for IP traceback, , ACM, Newyork , USA. pp.295-306, (2000).

DOI: 10.1145/347057.347560

Google Scholar

[5] Zhiqiang Gao and Nirwan Ansari, A practica and robust inter-domain marking scheme for IP traceback, Computer Networks, vol 3, pp.732-750, (2007).

DOI: 10.1016/j.comnet.2006.06.003

Google Scholar