学位论文详细信息
On Network-Layer Packet Traceback: Tracing Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Hybrid iTrace;Intention-Driven iTrace;Traceback;DoS;DDoS;iTrace;ICMP Traceback;IPSec;Network-Layer Tracing
Wu, Chien-Lung ; Edward Gehringer, Committee Member,George N. Rouskas, Committee Member,Shyhtsun Felix Wu, Committee Co-Chair,Arne A. Nilsson, Committee Chair,Wu, Chien-Lung ; Edward Gehringer ; Committee Member ; George N. Rouskas ; Committee Member ; Shyhtsun Felix Wu ; Committee Co-Chair ; Arne A. Nilsson ; Committee Chair
University:North Carolina State University
关键词: Hybrid iTrace;    Intention-Driven iTrace;    Traceback;    DoS;    DDoS;    iTrace;    ICMP Traceback;    IPSec;    Network-Layer Tracing;   
Others  :  https://repository.lib.ncsu.edu/bitstream/handle/1840.16/3806/etd.pdf?sequence=1&isAllowed=y
美国|英语
来源: null
PDF
【 摘 要 】

The objective of this research is to study the Internet Protocol (IP) traceback technique in defeating Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks. Tracing attackers is the first and most important step to solve the DoS/DDoS problem. In this dissertation, two new traceback techniques, PHIL and Intention-Driven iTrace, are proposed and evaluated. Based on the IPSec infrastructure, previously, the Decentralized Source Identification for Network-based Intrusions (DECIDUOUS) module has been implemented and evaluated. However, in order to trace attack sources across different administrative domains securely, the notion of Packet Header Information List (PHIL) for IPSec is proposed to enhance DECIDUOUS module. Second, it is shown, in this thesis, that the iTrace (ICMP traceback, being standardized in IETF) has some serious drawbacks. To overcome these drawbacks, the Intention-Driven iTrace (ID-iTrace) and the Hybrid iTrace schemes are proposed. Our simulation results confirm that the original iTrace scheme is not able to handle low attack traffic well. From our simulation, the Hybrid iTrace scheme is evaluated and demonstrated to be an efficient and practical mechanism for tracing DoS/DDoS attacks.

【 预 览 】
附件列表
Files Size Format View
On Network-Layer Packet Traceback: Tracing Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks 2984KB PDF download
  文献评价指标  
  下载次数:10次 浏览次数:25次