Browse > Article
http://dx.doi.org/10.13089/JKIISC.2003.13.1.19

An Attack Origin Detection Mechanism in IP Traceback Using Marking Algorithm  

김병룡 (인하대학교 전자계산공학과 인터넷보안 연구실)
김수덕 (안철수 연구소 보안연구2실 보안응용팀)
김유성 (인하대학교 정보통신공학부)
김기창 (인하대학교 정보통신공학부)
Abstract
Recently, the number of internet service companies is increasing and so is the number of malicious attackers. Damage such as distrust about credit and instability of the service by these attacks may influence us fatally as it makes companies image failing down. One of the frequent and fatal attacks is DoS(Denial-of-Service). Because the attacker performs IP spoofing for hiding his location in DoS attack it is hard to get an exact location of the attacker from source IP address only. and even if the system recovers from the attack successfully, if attack origin has not been identified, we have to consider the possibility that there may be another attack again in near future by the same attacker. This study suggests to find the attack origin through MAC address marking of the attack origin. It is based on an IP trace algorithm, called Marking Algorithm. It modifies the Martins Algorithm so that we can convey the MAC address of the intervening routers, and as a result it can trace the exact IP address of the original attacker. To improve the detection time, our algorithm also contains a technique to improve the packet arrival rate. By adjusting marking probability according to the distance from the packet origin we were able to decrease the number of needed packets to traceback the IP address.
Keywords
DoS 공격;공격 근원지;IP 역추적;MAC 주소;패킷 도착율;
Citations & Related Records
연도 인용수 순위
  • Reference
1 /
[ David A. Curry ] / UNIX System Security
2 CenterTrack: An IP Overlay Network for Tracking DoS Floods /
[ R. Stone ] / Proceedings of the 2000 USENIX Security Symposium
3 /
[ Computer Emergency Response Team(CERT) ] / CERT Advisory CA-1995-01 IP Spoofing Attacks and Hijacked Terminal Connections
4 /
[] / Computer Emergency Response Team(CERT)
5 Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing /
[ P. Ferguson;D. Senie ] / RFC 2267
6 Practical network support for IP traceback /
[ Stefan Savage;David Wetherall;Anna Karlin;Tom Anderson ] / Proc. of ACM SIGCOMM
7 /
[ Computer Emergency Response Team(CERT) ] / CERT Advisory CA-2000-01 Denial-of-service developments
8 /
[ S. M. Dellovin ] / The ICMP Traceback Mess ages
9 /
[] / Project IDS - Intrusion Detection System
10 Security Fun with Ocxmon and Cflowd /
[ G. Sager ] / Presentation at the Internet 2 Working Group
11 Advanced and Authenticated Marking Schemes for IP Traceback /
[ Dawn Xiaodong Song;Adrian Perrig ] / Proc. IEEE INFOCOM