LPM: A lightweight authenticated packet marking approach for IP traceback

IP traceback approaches have an important role to play in mitigating the attacks based on IP spoofing like Denial of service/Distributed denial of service attacks. Due to the obvious significance of such attacks, numerous approaches have been proposed in the literature. However, as per our observati...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computer networks (Amsterdam, Netherlands : 1999) Netherlands : 1999), 2018-07, Vol.140, p.41-50
Hauptverfasser: Patel, Hasmukh, Jinwala, Devesh C
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 50
container_issue
container_start_page 41
container_title Computer networks (Amsterdam, Netherlands : 1999)
container_volume 140
creator Patel, Hasmukh
Jinwala, Devesh C
description IP traceback approaches have an important role to play in mitigating the attacks based on IP spoofing like Denial of service/Distributed denial of service attacks. Due to the obvious significance of such attacks, numerous approaches have been proposed in the literature. However, as per our observations, there is still a scope to improve the IP traceback techniques especially in terms of reducing the number of false-positives, reducing the number of packets required at the victim node and the requirement of an upstream router map. Motivated by this observation, in this paper, we propose a novel Light-weight Packet Marking (LPM) that is a probabilistic packet marking (PPM) approach, to trace back the sources of an attack. LPM improves upon the existing PPM approaches in the number of packets required by the victim to reconstruct the attack paths, reduced false-positives and support incremental deployment. It does not even require an upstream router map. LPM also authenticates the marking that enables a victim to detect the attackers attempts to forge the marking. LPM uses multiple hash functions to reduce the false positives further to zero. We carry out experimental analysis as well as security analysis of LPM considering attacker and compromised routers in our attacker model.
doi_str_mv 10.1016/j.comnet.2018.04.014
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2094502941</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S1389128618301786</els_id><sourcerecordid>2094502941</sourcerecordid><originalsourceid>FETCH-LOGICAL-c334t-ed7c9c13b3f062f278df089e4450d0492256c06cf1a227e9fed0d36cd843d0da3</originalsourceid><addsrcrecordid>eNp9UMtOwzAQjBBIlMIfcLDEOWH9aGJzQKoQj0pF9ABny7U3rdM2KY4L4u9xFc5cducwM7szWXZNoaBAy9umsN2uxVgwoLIAUQAVJ9mIyorlFZTqNGEuVU6ZLM-zi75vAEAIJkfZbL54vSNTsvWrdfzG4yTmENfYRm9NREf2xm4wkp0JG9-uiNnvQ2fsmtRdILMFicFYXCbOZXZWm22PV397nH08Pb4_vOTzt-fZw3SeW85FzNFVVlnKl7yGktWskq4GqVCICTgQirFJaaG0NTWMVahqdOB4aZ0UPCHDx9nN4Jv--DxgH3XTHUKbTmoGKrkwJWhiiYFlQ9f3AWu9Dz5l-NEU9LE03eihNH0sTYPQqbQkux9kmBJ8eQy6tx5bi84HtFG7zv9v8AufFXah</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2094502941</pqid></control><display><type>article</type><title>LPM: A lightweight authenticated packet marking approach for IP traceback</title><source>Elsevier ScienceDirect Journals</source><creator>Patel, Hasmukh ; Jinwala, Devesh C</creator><creatorcontrib>Patel, Hasmukh ; Jinwala, Devesh C</creatorcontrib><description>IP traceback approaches have an important role to play in mitigating the attacks based on IP spoofing like Denial of service/Distributed denial of service attacks. Due to the obvious significance of such attacks, numerous approaches have been proposed in the literature. However, as per our observations, there is still a scope to improve the IP traceback techniques especially in terms of reducing the number of false-positives, reducing the number of packets required at the victim node and the requirement of an upstream router map. Motivated by this observation, in this paper, we propose a novel Light-weight Packet Marking (LPM) that is a probabilistic packet marking (PPM) approach, to trace back the sources of an attack. LPM improves upon the existing PPM approaches in the number of packets required by the victim to reconstruct the attack paths, reduced false-positives and support incremental deployment. It does not even require an upstream router map. LPM also authenticates the marking that enables a victim to detect the attackers attempts to forge the marking. LPM uses multiple hash functions to reduce the false positives further to zero. We carry out experimental analysis as well as security analysis of LPM considering attacker and compromised routers in our attacker model.</description><identifier>ISSN: 1389-1286</identifier><identifier>EISSN: 1872-7069</identifier><identifier>DOI: 10.1016/j.comnet.2018.04.014</identifier><language>eng</language><publisher>Amsterdam: Elsevier B.V</publisher><subject>Cybersecurity ; Denial of service attacks ; Internet Protocol ; IP (Internet Protocol) ; IP spoofing attacks ; IP traceback ; Lightweight ; Marking ; Packet marking ; Routers ; Securities analysis ; Spoofing ; Studies ; Upstream ; Weight reduction</subject><ispartof>Computer networks (Amsterdam, Netherlands : 1999), 2018-07, Vol.140, p.41-50</ispartof><rights>2018 Elsevier B.V.</rights><rights>Copyright Elsevier Sequoia S.A. Jul 20, 2018</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c334t-ed7c9c13b3f062f278df089e4450d0492256c06cf1a227e9fed0d36cd843d0da3</citedby><cites>FETCH-LOGICAL-c334t-ed7c9c13b3f062f278df089e4450d0492256c06cf1a227e9fed0d36cd843d0da3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S1389128618301786$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3536,27903,27904,65309</link.rule.ids></links><search><creatorcontrib>Patel, Hasmukh</creatorcontrib><creatorcontrib>Jinwala, Devesh C</creatorcontrib><title>LPM: A lightweight authenticated packet marking approach for IP traceback</title><title>Computer networks (Amsterdam, Netherlands : 1999)</title><description>IP traceback approaches have an important role to play in mitigating the attacks based on IP spoofing like Denial of service/Distributed denial of service attacks. Due to the obvious significance of such attacks, numerous approaches have been proposed in the literature. However, as per our observations, there is still a scope to improve the IP traceback techniques especially in terms of reducing the number of false-positives, reducing the number of packets required at the victim node and the requirement of an upstream router map. Motivated by this observation, in this paper, we propose a novel Light-weight Packet Marking (LPM) that is a probabilistic packet marking (PPM) approach, to trace back the sources of an attack. LPM improves upon the existing PPM approaches in the number of packets required by the victim to reconstruct the attack paths, reduced false-positives and support incremental deployment. It does not even require an upstream router map. LPM also authenticates the marking that enables a victim to detect the attackers attempts to forge the marking. LPM uses multiple hash functions to reduce the false positives further to zero. We carry out experimental analysis as well as security analysis of LPM considering attacker and compromised routers in our attacker model.</description><subject>Cybersecurity</subject><subject>Denial of service attacks</subject><subject>Internet Protocol</subject><subject>IP (Internet Protocol)</subject><subject>IP spoofing attacks</subject><subject>IP traceback</subject><subject>Lightweight</subject><subject>Marking</subject><subject>Packet marking</subject><subject>Routers</subject><subject>Securities analysis</subject><subject>Spoofing</subject><subject>Studies</subject><subject>Upstream</subject><subject>Weight reduction</subject><issn>1389-1286</issn><issn>1872-7069</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNp9UMtOwzAQjBBIlMIfcLDEOWH9aGJzQKoQj0pF9ABny7U3rdM2KY4L4u9xFc5cducwM7szWXZNoaBAy9umsN2uxVgwoLIAUQAVJ9mIyorlFZTqNGEuVU6ZLM-zi75vAEAIJkfZbL54vSNTsvWrdfzG4yTmENfYRm9NREf2xm4wkp0JG9-uiNnvQ2fsmtRdILMFicFYXCbOZXZWm22PV397nH08Pb4_vOTzt-fZw3SeW85FzNFVVlnKl7yGktWskq4GqVCICTgQirFJaaG0NTWMVahqdOB4aZ0UPCHDx9nN4Jv--DxgH3XTHUKbTmoGKrkwJWhiiYFlQ9f3AWu9Dz5l-NEU9LE03eihNH0sTYPQqbQkux9kmBJ8eQy6tx5bi84HtFG7zv9v8AufFXah</recordid><startdate>20180720</startdate><enddate>20180720</enddate><creator>Patel, Hasmukh</creator><creator>Jinwala, Devesh C</creator><general>Elsevier B.V</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>E3H</scope><scope>F2A</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20180720</creationdate><title>LPM: A lightweight authenticated packet marking approach for IP traceback</title><author>Patel, Hasmukh ; Jinwala, Devesh C</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c334t-ed7c9c13b3f062f278df089e4450d0492256c06cf1a227e9fed0d36cd843d0da3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Cybersecurity</topic><topic>Denial of service attacks</topic><topic>Internet Protocol</topic><topic>IP (Internet Protocol)</topic><topic>IP spoofing attacks</topic><topic>IP traceback</topic><topic>Lightweight</topic><topic>Marking</topic><topic>Packet marking</topic><topic>Routers</topic><topic>Securities analysis</topic><topic>Spoofing</topic><topic>Studies</topic><topic>Upstream</topic><topic>Weight reduction</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Patel, Hasmukh</creatorcontrib><creatorcontrib>Jinwala, Devesh C</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>Library &amp; Information Sciences Abstracts (LISA)</collection><collection>Library &amp; Information Science Abstracts (LISA)</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computer networks (Amsterdam, Netherlands : 1999)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Patel, Hasmukh</au><au>Jinwala, Devesh C</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>LPM: A lightweight authenticated packet marking approach for IP traceback</atitle><jtitle>Computer networks (Amsterdam, Netherlands : 1999)</jtitle><date>2018-07-20</date><risdate>2018</risdate><volume>140</volume><spage>41</spage><epage>50</epage><pages>41-50</pages><issn>1389-1286</issn><eissn>1872-7069</eissn><abstract>IP traceback approaches have an important role to play in mitigating the attacks based on IP spoofing like Denial of service/Distributed denial of service attacks. Due to the obvious significance of such attacks, numerous approaches have been proposed in the literature. However, as per our observations, there is still a scope to improve the IP traceback techniques especially in terms of reducing the number of false-positives, reducing the number of packets required at the victim node and the requirement of an upstream router map. Motivated by this observation, in this paper, we propose a novel Light-weight Packet Marking (LPM) that is a probabilistic packet marking (PPM) approach, to trace back the sources of an attack. LPM improves upon the existing PPM approaches in the number of packets required by the victim to reconstruct the attack paths, reduced false-positives and support incremental deployment. It does not even require an upstream router map. LPM also authenticates the marking that enables a victim to detect the attackers attempts to forge the marking. LPM uses multiple hash functions to reduce the false positives further to zero. We carry out experimental analysis as well as security analysis of LPM considering attacker and compromised routers in our attacker model.</abstract><cop>Amsterdam</cop><pub>Elsevier B.V</pub><doi>10.1016/j.comnet.2018.04.014</doi><tpages>10</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1389-1286
ispartof Computer networks (Amsterdam, Netherlands : 1999), 2018-07, Vol.140, p.41-50
issn 1389-1286
1872-7069
language eng
recordid cdi_proquest_journals_2094502941
source Elsevier ScienceDirect Journals
subjects Cybersecurity
Denial of service attacks
Internet Protocol
IP (Internet Protocol)
IP spoofing attacks
IP traceback
Lightweight
Marking
Packet marking
Routers
Securities analysis
Spoofing
Studies
Upstream
Weight reduction
title LPM: A lightweight authenticated packet marking approach for IP traceback
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T06%3A05%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=LPM:%20A%20lightweight%20authenticated%20packet%20marking%20approach%20for%20IP%20traceback&rft.jtitle=Computer%20networks%20(Amsterdam,%20Netherlands%20:%201999)&rft.au=Patel,%20Hasmukh&rft.date=2018-07-20&rft.volume=140&rft.spage=41&rft.epage=50&rft.pages=41-50&rft.issn=1389-1286&rft.eissn=1872-7069&rft_id=info:doi/10.1016/j.comnet.2018.04.014&rft_dat=%3Cproquest_cross%3E2094502941%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2094502941&rft_id=info:pmid/&rft_els_id=S1389128618301786&rfr_iscdi=true