doss-topologoybasedpacket-2006.pdf (340.12 kB)
Topology based packet marking for IP traceback
conference contribution
posted on 2006-01-01, 00:00 authored by H Alwis, Robin Ram Mohan DossRobin Ram Mohan Doss, P Hewage, Morshed ChowdhuryMorshed ChowdhuryIP source address spoofing exploits a fundamental weakness in the Internet Protocol. It is exploited in many types of network-based attacks such as session hijacking and Denial of Service (DoS). Ingress and egress filtering is aimed at preventing IP spoofing. Techniques such as History based filtering are being used during DoS attacks to filter out attack packets. Packet marking techniques are being used to trace IP packets to a point that is close as possible to their actual source. Present IP spoofing countermeasures are hindered by compatibility issues between IPv4 and IPv6, implementation issues and their effectiveness under different types of attacks. We propose a topology based packet marking method that builds on the flexibility of packet marking as an IP trace back method while overcoming most of the shortcomings of present packet marking techniques.
History
Event
Australian Telecommunication Networks & Applications Conference (2006 : University of Melbourne)Pagination
224 - 228Publisher
University of MelbourneLocation
Melbourne, AustraliaPlace of publication
Melbourne, Vic.Start date
2006-12-04End date
2006-12-06ISBN-13
9780977586103ISBN-10
0977586103Language
engPublication classification
E1 Full written paper - refereedCopyright notice
2006, The AuthorEditor/Contributor(s)
R TuckerTitle of proceedings
Proceedings of the (ATNAC) Australian Telecommunication Networks and Applications ConferenceUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorks
BibTeX
Ref. manager
Endnote
DataCite
NLM
DC