{"title":"一种高效、自适应的IP回溯方案","authors":"Kayoko Iwamoto, Masakazu Soshi, T. Satoh","doi":"10.1109/SOCA.2014.19","DOIUrl":null,"url":null,"abstract":"IP trace back is considered to be one of the promising countermeasures against Distributed Denial of Service (DDoS) attacks. IP trace back protocols must be effective as well as simple enough to be efficiently executed. However, there is almost no such an IP trace back protocol. In this paper, we consider an IP trace back protocol proposed by Muthuprasanna and Manimaran [1] (STE scheme for short) and shall propose a new, efficient, and adaptive IP trace back scheme, which is partly based on STE. Simply speaking, our scheme is efficient since it adaptively changes marking probabilities decrease the number of marking bits. In this paper, we conduct theoretical and numerical analyses of our scheme in detail and show that our scheme is more efficient than STE in terms of marking bit length and the number of packets for attack path recovery. The result is also supported by simulations experiments.","PeriodicalId":138805,"journal":{"name":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"An Efficient and Adaptive IP Traceback Scheme\",\"authors\":\"Kayoko Iwamoto, Masakazu Soshi, T. Satoh\",\"doi\":\"10.1109/SOCA.2014.19\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"IP trace back is considered to be one of the promising countermeasures against Distributed Denial of Service (DDoS) attacks. IP trace back protocols must be effective as well as simple enough to be efficiently executed. However, there is almost no such an IP trace back protocol. In this paper, we consider an IP trace back protocol proposed by Muthuprasanna and Manimaran [1] (STE scheme for short) and shall propose a new, efficient, and adaptive IP trace back scheme, which is partly based on STE. Simply speaking, our scheme is efficient since it adaptively changes marking probabilities decrease the number of marking bits. In this paper, we conduct theoretical and numerical analyses of our scheme in detail and show that our scheme is more efficient than STE in terms of marking bit length and the number of packets for attack path recovery. The result is also supported by simulations experiments.\",\"PeriodicalId\":138805,\"journal\":{\"name\":\"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-11-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SOCA.2014.19\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SOCA.2014.19","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
IP trace back is considered to be one of the promising countermeasures against Distributed Denial of Service (DDoS) attacks. IP trace back protocols must be effective as well as simple enough to be efficiently executed. However, there is almost no such an IP trace back protocol. In this paper, we consider an IP trace back protocol proposed by Muthuprasanna and Manimaran [1] (STE scheme for short) and shall propose a new, efficient, and adaptive IP trace back scheme, which is partly based on STE. Simply speaking, our scheme is efficient since it adaptively changes marking probabilities decrease the number of marking bits. In this paper, we conduct theoretical and numerical analyses of our scheme in detail and show that our scheme is more efficient than STE in terms of marking bit length and the number of packets for attack path recovery. The result is also supported by simulations experiments.