The search functionality is under construction.
The search functionality is under construction.

A Layer-2 Extension to Hash-Based IP Traceback

Hiroaki HAZEYAMA, Masafumi OE, Youki KADOBAYASHI

  • Full Text Views

    0

  • Cite this

Summary :

Hash-based IP traceback is a technique to generate audit trails for traffic within a network. Using the audit trails, it reconstructs not only the true attack paths of a Distributed Denial of Service attack (DDoS attack), but also the true path of a single packet attack. However, hash-based IP traceback cannot identify attacker nodes themselves because it has no audit trail on the subnet's layer-2 network under the detected leaf router, which is the nearest node to an attacker node on a layer-3 network. We propose a layer-2 extension to hash-based IP traceback, which stores two identifiers with packets' audit trails while reducing the memory requirement for storing identifiers. One of these identifiers shows the leaf router's interface through which an attacking packet came, and the other represents the ingress port on a layer-2 switch through which the attacking packet came. We implement a prototype on FreeBSD and evaluate it in a preliminary experiment.

Publication
IEICE TRANSACTIONS on Information Vol.E86-D No.11 pp.2325-2333
Publication Date
2003/11/01
Publicized
Online ISSN
DOI
Type of Manuscript
Special Section PAPER (Special Issue on New Technologies in the Internet and their Applications)
Category

Authors

Keyword