메뉴 건너뛰기




Volumn 49, Issue 4, 2006, Pages 418-442

An efficient distributed algorithm to identify and traceback DDoS traffic

Author keywords

Distributed algorithm; Programmable routers; Security and protection

Indexed keywords

ALGORITHMS; COMPUTER SIMULATION; DISTRIBUTED COMPUTER SYSTEMS; INTERNET; NETWORK PROTOCOLS; PACKET NETWORKS; ROUTERS; STATISTICS;

EID: 33745684710     PISSN: 00104620     EISSN: 14602067     Source Type: Journal    
DOI: 10.1093/comjnl/bxl026     Document Type: Article
Times cited : (14)

References (42)
  • 1
    • 0003659023 scopus 로고    scopus 로고
    • CERT Advisory CA-2000-01: Denial-of-service developments
    • CERT Coordinate Center Available at
    • CERT Coordinate Center (2000) CERT Advisory CA-2000-01: denial-of-service developments. Available at http://www.cert.org/ advisories/CA-2000-01.html.
    • (2000)
  • 2
    • 0036343320 scopus 로고    scopus 로고
    • Scalable IP lookup for programmable routers
    • New York, June 23-27, IEEE, Washington, DC
    • Taylor, D. E., Lockwood, J. W., Sproull, T. S., Turner, J. S. and Parlour, D. B. (2002) Scalable IP lookup for programmable routers. In Proc. IEEE Infocom., New York, June 23-27, pp. 526-571. IEEE, Washington, DC.
    • (2002) Proc. IEEE Infocom. , pp. 526-571
    • Taylor, D.E.1    Lockwood, J.W.2    Sproull, T.S.3    Turner, J.S.4    Parlour, D.B.5
  • 3
    • 0032691593 scopus 로고    scopus 로고
    • OS support for general-purpose routers
    • Rio Rico, AZ, March 29-30, IEEE, Washington, DC
    • Peterson, L. L., Karlin, S. and Li, K. (1999) OS support for general-purpose routers. In Proc. Workshop on Hot Topics in Operating Systems, Rio Rico, AZ, March 29-30, pp. 38-43. IEEE, Washington, DC.
    • (1999) Proc. Workshop on Hot Topics in Operating Systems , pp. 38-43
    • Peterson, L.L.1    Karlin, S.2    Li, K.3
  • 4
    • 0034832776 scopus 로고    scopus 로고
    • Scheduling computations on a software-based router
    • Cambridge, MA, June 16-20, ACM Press, New York, NY
    • Qie, X., Bavier, A., Peterson, L. and Karlin, S. (2001) Scheduling computations on a software-based router. In Proc. ACM SIGMETRICS, Cambridge, MA, June 16-20, pp. 13-24. ACM Press, New York, NY.
    • (2001) Proc. ACM SIGMETRICS , pp. 13-24
    • Qie, X.1    Bavier, A.2    Peterson, L.3    Karlin, S.4
  • 5
    • 0035270344 scopus 로고    scopus 로고
    • Resource management in software-programmable router operating systems
    • Yau, D. K. Y. and Chen, X. (2001) Resource management in software-programmable router operating systems. IEEE J. Sel. Area. Commun., 19, 488-500.
    • (2001) IEEE J. Sel. Area. Commun. , vol.19 , pp. 488-500
    • Yau, D.K.Y.1    Chen, X.2
  • 6
    • 0022020346 scopus 로고
    • Distributed snapshots: Determining global states of distributed systems
    • Chandy, K. M. and Lamport, L. (1985) Distributed snapshots: Determining global states of distributed systems. ACM Trans. Comput. Syst., 3, 63-75.
    • (1985) ACM Trans. Comput. Syst. , vol.3 , pp. 63-75
    • Chandy, K.M.1    Lamport, L.2
  • 7
    • 20444466125 scopus 로고    scopus 로고
    • Internet Mapping Project
    • Available at
    • Internet Mapping Project (1999) Available at http://research.lumeta.com/ ches/map/index.html.
    • (1999)
  • 9
    • 33745682779 scopus 로고    scopus 로고
    • Cooperative Association for Internet Data Analysis. Available at
    • Cooperative Association for Internet Data Analysis. (1997) Available at http://www.caida.org/.
    • (1997)
  • 10
    • 0033650584 scopus 로고    scopus 로고
    • Practical network support for IP traceback
    • Stockholm, Sweden, August 28-September 1, ACM Press, New York, NY
    • Savage, S., Wetherall, D., Karlin, A. and Anderson, T. (2000) Practical network support for IP traceback. In Proc. 2000 ACM SIGCOMM Conf., Stockholm, Sweden, August 28-September 1, pp. 295-306. ACM Press, New York, NY.
    • (2000) Proc. 2000 ACM SIGCOMM Conf. , pp. 295-306
    • Savage, S.1    Wetherall, D.2    Karlin, A.3    Anderson, T.4
  • 11
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • Anchorage, AK, April 22-26, IEEE, Washington, DC
    • Song, D. X. and Perrig, A. (2001) Advanced and authenticated marking schemes for IP traceback. In Proc. IEEE INFOCOM '01, Anchorage, AK, April 22-26, pp. 878-886. IEEE, Washington, DC.
    • (2001) Proc. IEEE INFOCOM '01 , pp. 878-886
    • Song, D.X.1    Perrig, A.2
  • 14
    • 33745725083 scopus 로고    scopus 로고
    • Proactive protection: New techniques and best practices help service providers counter increase in cyber attacks
    • Barry, D. (2004) Proactive protection: New techniques and best practices help service providers counter increase in cyber attacks. Packet: Cisco Systems Users Magazine, 16, 64-68.
    • (2004) Packet: Cisco Systems Users Magazine , vol.16 , pp. 64-68
    • Barry, D.1
  • 15
    • 19744366570 scopus 로고    scopus 로고
    • OPERA: An opensource extensible router architecture for adding new network services and protocols
    • Chan, B. C., Lau, J. C. and Lui, J. C. (2005) OPERA: An opensource extensible router architecture for adding new network services and protocols. J. Syst. Softw., 78, 24-36.
    • (2005) J. Syst. Softw. , vol.78 , pp. 24-36
    • Chan, B.C.1    Lau, J.C.2    Lui, J.C.3
  • 16
    • 33745682772 scopus 로고    scopus 로고
    • The netfiler/iptables projects. Available at
    • The netfiler/iptables projects. (2000) Available at: http://www.netfilter. org.
    • (2000)
  • 17
    • 67649497897 scopus 로고    scopus 로고
    • Performance analysis of the Linux Firewall in a host
    • CiNIC - Calpoly intelligent NIC Project. Available at
    • Harris, J. and Melara, A. J. (2002) Performance analysis of the Linux Firewall in a host. CiNIC - Calpoly intelligent NIC Project. Available at http://www.ee.calpoly.edu/3comproject/.
    • (2002)
    • Harris, J.1    Melara, A.J.2
  • 19
    • 0038349210 scopus 로고    scopus 로고
    • Code red worm propagation modeling and analysis
    • Washington, DC, USA, November 18-22, ACM Press, New York, NY
    • Zou, C. C., Gong, W. and Towsley, D. (2002) Code red worm propagation modeling and analysis. In Proc. 9th ACM Conf. Computer and Communications Security, Washington, DC, USA, November 18-22, pp. 138-147. ACM Press, New York, NY.
    • (2002) Proc. 9th ACM Conf. Computer and Communications Security , pp. 138-147
    • Zou, C.C.1    Gong, W.2    Towsley, D.3
  • 20
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of-service attacks
    • Paxson, V. (2001) An analysis of using reflectors for distributed denial-of-service attacks. ACM SIGCOMM Comput. Commun. Rev., 31, 38-47.
    • (2001) ACM SIGCOMM Comput. Commun. Rev. , vol.31 , pp. 38-47
    • Paxson, V.1
  • 22
    • 1242287727 scopus 로고    scopus 로고
    • Low-rate TCP-targeted denial of service attacks: The shrew vs. the mice and elephants
    • Karlsruhe, Germany, August 25-29, ACM Press, New York, NY
    • Kuzmanovic, A. and Knightly, E. W. (2003) Low-rate TCP-targeted denial of service attacks: The shrew vs. the mice and elephants. In Proc. ACM SIGCOMM 2003, Karlsruhe, Germany, August 25-29, pp. 75-86. ACM Press, New York, NY.
    • (2003) Proc. ACM SIGCOMM 2003 , pp. 75-86
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 23
    • 17744370129 scopus 로고    scopus 로고
    • Low rate TCP denial-of-service attack detection at edge routers
    • Shevtekar, A., Anantharam, K. and Ansari, N. (2005) Low rate TCP denial-of-service attack detection at edge routers. IEEE Commun. Lett., 9, 262-265.
    • (2005) IEEE Commun. Lett. , vol.9 , pp. 262-265
    • Shevtekar, A.1    Anantharam, K.2    Ansari, N.3
  • 24
    • 17744379157 scopus 로고    scopus 로고
    • Defending against low-rate TCP attack: Dynamic detection and protection
    • Berlin, Germany, October 5-8, IEEE, Washington, DC
    • Sun, H., Lui, J. C. S. and Yau, D. K. Y. (2004) Defending against low-rate TCP attack: Dynamic detection and protection. In Proc. IEEE Int. Conf. Network Protocols (ICNP), Berlin, Germany, October 5-8, pp. 196-205. IEEE, Washington, DC.
    • (2004) Proc. IEEE Int. Conf. Network Protocols (ICNP) , pp. 196-205
    • Sun, H.1    Lui, J.C.S.2    Yau, D.K.Y.3
  • 25
    • 0002738343 scopus 로고
    • Security problems in the TCP/IP protocol suite
    • Bellowin, S. M. (1989) Security problems in the TCP/IP protocol suite. ACM Comput. Commun. Rev., 19, 32-48.
    • (1989) ACM Comput. Commun. Rev. , vol.19 , pp. 32-48
    • Bellowin, S.M.1
  • 26
    • 0003553457 scopus 로고    scopus 로고
    • RFC 2267: Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
    • Network Working Group, Request for Comments: 2267. Available at
    • Ferguson, P. and Senie, D. (1998) RFC 2267: Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. Network Working Group, Request for Comments: 2267. Available at http://www.faqs.org/rfcs/rfc2267.html.
    • (1998)
    • Ferguson, P.1    Senie, D.2
  • 27
    • 0034776786 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed DoS Attack prevention in power-law internets
    • San Diego, CA, August 27-31, ACM Press, New York, NY
    • Park, K. and Lee, H. (2001) On the effectiveness of route-based packet filtering for distributed DoS Attack prevention in power-law internets. In Proc. SIGCOMM, San Diego, CA, August 27-31, pp. 15-26. ACM Press, New York, NY.
    • (2001) Proc. SIGCOMM , pp. 15-26
    • Park, K.1    Lee, H.2
  • 28
    • 33745682768 scopus 로고    scopus 로고
    • Global Incident Analysis Center Egress Filtering v 0.2 2000. Available at
    • Global Incident Analysis Center Egress Filtering v 0.2 2000 Available at http://www.sans.org/y2k/egress.htm.
  • 29
    • 15544363902 scopus 로고    scopus 로고
    • Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
    • Yau, D. K. Y., Lui, J. C. S., Liang, F. and Yeung, Y. (2005) Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. IEEE/ACM Trans. Netw., 13, 29-42.
    • (2005) IEEE/ACM Trans. Netw. , vol.13 , pp. 29-42
    • Yau, D.K.Y.1    Lui, J.C.S.2    Liang, F.3    Yeung, Y.4
  • 31
    • 0035010963 scopus 로고    scopus 로고
    • On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
    • Anchorage AK, April 22-26, IEEE Washington, DC
    • Park, K. and Lee, H. (2001) On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. In Proc. IEEE INFOCOM '01, Anchorage, AK, April 22-26, pp. 338-347. IEEE, Washington, DC.
    • (2001) Proc. IEEE INFOCOM '01 , pp. 338-347
    • Park, K.1    Lee, H.2
  • 33
    • 21244446746 scopus 로고    scopus 로고
    • Perimeter-based defense against high bandwidth DDoS attacks
    • Chen, S. and Song, Q. (2005) Perimeter-based defense against high bandwidth DDoS attacks. IEEE Trans. Paral. Distrib. Syst., 16, 526-537.
    • (2005) IEEE Trans. Paral. Distrib. Syst. , vol.16 , pp. 526-537
    • Chen, S.1    Song, Q.2
  • 34
    • 0037328484 scopus 로고    scopus 로고
    • Sustaining availability of web services under distributed denial of service attacks
    • Xu, J. and Lee, W. (2003) Sustaining availability of web services under distributed denial of service attacks. IEEE Trans. Comput., 52, 195-208.
    • (2003) IEEE Trans. Comput. , vol.52 , pp. 195-208
    • Xu, J.1    Lee, W.2
  • 35
    • 25844469597 scopus 로고    scopus 로고
    • You can run, but you can't hide: An effective methodology to traceback DDoS attackers
    • Law, K. T., Lui, J. C. S. and Yau, D. K. Y. (2005) You can run, but you can't hide: An effective methodology to traceback DDoS attackers. IEEE Trans. Paral. Distrib. Syst., 15, 799-813.
    • (2005) IEEE Trans. Paral. Distrib. Syst. , vol.15 , pp. 799-813
    • Law, K.T.1    Lui, J.C.S.2    Yau, D.K.Y.3
  • 36
    • 27844501172 scopus 로고    scopus 로고
    • Trade-offs in probabilistic packet marking for IP traceback
    • Adler, M. (2005) Trade-offs in probabilistic packet marking for IP traceback. J. ACM, 52, 217-244.
    • (2005) J. ACM , vol.52 , pp. 217-244
    • Adler, M.1
  • 37
    • 0142039750 scopus 로고    scopus 로고
    • IP traceback-based intelligent packet filtering: A novel technique for defending against internet DDoS attacks
    • Sung, M. and Xu, J. (2003) IP traceback-based intelligent packet filtering: A novel technique for defending against internet DDoS attacks. IEEE Trans. Paral. Distrib. Syst., 14, 861-872.
    • (2003) IEEE Trans. Paral. Distrib. Syst. , vol.14 , pp. 861-872
    • Sung, M.1    Xu, J.2
  • 38
    • 0038059205 scopus 로고    scopus 로고
    • IP traceback with deterministic packet marking
    • Belenky, A. and Ansari, N. (2003) IP traceback with deterministic packet marking. IEEE Commun. Lett., 7, 162-164.
    • (2003) IEEE Commun. Lett. , vol.7 , pp. 162-164
    • Belenky, A.1    Ansari, N.2
  • 40
    • 20344392671 scopus 로고    scopus 로고
    • Tracing cyber attacks from the practical perspective
    • Gao, Z. and Ansari, N. (2005) Tracing cyber attacks from the practical perspective. IEEE Commun. Mag., 43, 123-131.
    • (2005) IEEE Commun. Mag. , vol.43 , pp. 123-131
    • Gao, Z.1    Ansari, N.2
  • 41
    • 0038318530 scopus 로고    scopus 로고
    • An effcient secure authenticated group key exchange algorithm for large and dynamic groups
    • October
    • Alves-Foss, J. (2000) An effcient secure authenticated group key exchange algorithm for large and dynamic groups. In Proc. 23rd National Information Systems Security Conf., October.
    • (2000) Proc. 23rd National Information Systems Security Conf.
    • Alves-Foss, J.1
  • 42
    • 8344257973 scopus 로고    scopus 로고
    • Multiple source, multiple destination network tomography
    • Hong Kong, China, March 7-11, IEEE, Washington, DC
    • Rabbat, M., Nowak, R. and Coates, M. (2004) Multiple source, multiple destination network tomography. In Proc. IEEE Infocom 2004. Hong Kong, China, March 7-11, pp. 1628-1639. IEEE, Washington, DC.
    • (2004) Proc. IEEE Infocom 2004 , pp. 1628-1639
    • Rabbat, M.1    Nowak, R.2    Coates, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.