Previous [ 1] [ 2] [ 3] [ 4] [ 5] [ 6] [ 7] [ 8] [ 9] [ 10] [ 11] [ 12] [ 13] [ 14] [ 15]

@

Journal of Information Science and Engineering, Vol. 27 No. 6, pp. 1985-1999 (November 2011)

IP Traceback Based on Chinese Remainder Theorem

LIH-CHYAU WUU, CHI-HSIANG HUNG* AND JYUN-YAN YANG
Department of Computer Science and Information Engineering
*Graduate School of Engineering Science and Technology
National Yunlin University of Science and Technology
Douliou, Yunlin, 640 Taiwan

IP traceback is a defense method to help a victim to identifying the sources of attacking packets. In this paper, we propose an IP traceback method based on the Chinese Remainder Theorem to require routers to probabilistically mark packets with partial path information when packets traverse routers through the Internet. The routers with the proposed IP traceback method can interoperate seamlessly with legacy routers and be incrementally deployable. The simulation reveals that our method requires fewer numbers of marked packets and takes less time to reconstruct the attacking paths, and has lower false combination rate in comparison with the previous works [10, 13, 15]. Furthermore, by our method, a victim does not need to maintain the network topology while it reconstructs attacking paths.

Keywords: IP traceback, probabilistic packet marking, Chinese remainder theorem, attacking path reconstruction, IP spoofing

Full Text () Retrieve PDF document (201111_12.pdf)

Received February 23, 2010; revised April 21 & June 9, 2010; accepted July 29, 2010.
Communicated by Ren-Hung Hwang.