Network support for IP traceback

被引:360
作者
Savage, S [1 ]
Wetherall, D
Karlin, A
Anderson, T
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
[2] Univ Washington, Dept Comp Sci & Engn, Seattle, WA 98195 USA
基金
美国国家科学基金会;
关键词
computer network management; computer network security; network servers; stochastic approximation; wide-area networks;
D O I
10.1109/90.929847
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back toward their source. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or "spoofed," source addresses. In this paper, we describe a general purpose traceback mechanism based on probabilistic packet marking in the network. Our approach allows a victim to identify the network path(s) traversed by attack traffic without requiring interactive operational support from Internet Service Providers (ISPs). Moreover, this traceback can be performed "post mortem"-after an attack has completed. We present an implementation of this technology that is incrementally deployable, (mostly) backward compatible, and can be efficiently implemented using conventional technology.
引用
收藏
页码:226 / 237
页数:12
相关论文
共 43 条
[11]  
*CERT, 2000, IN200004 CERT
[12]  
CHESWICK B, 2000, INTERNET MAPPING PRO
[13]  
*CISC SYST, 1997, CONF TCP INT PREV DE
[14]  
CLAFFY K, 2000, COMMUNICATION JAN
[15]  
*COMP SEC I FED BU, 1999, CSI FBI COMP CRIM SE
[16]  
DEAN D, 2001, P 2001 NETW DISTR SY
[17]  
Deering S., 1998, INTERNET PROTOCOL VE
[18]  
Feller W., 1966, INTRO PROBABILITY TH, VI
[19]  
GLAVE J, 1998, SMURFING CRIPPLES IS
[20]  
GOLDBERG I, 1999, FREEDOM NETWORK 1 0