JISE


  [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15]


Journal of Information Science and Engineering, Vol. 27 No. 6, pp. 1985-1999


IP Traceback Based on Chinese Remainder Theorem


LIH-CHYAU WUU, CHI-HSIANG HUNG* AND JYUN-YAN YANG
Department of Computer Science and Information Engineering 
*Graduate School of Engineering Science and Technology 
National Yunlin University of Science and Technology 
Douliou, Yunlin, 640 Taiwan


    IP traceback is a defense method to help a victim to identifying the sources of attacking packets. In this paper, we propose an IP traceback method based on the Chinese Remainder Theorem to require routers to probabilistically mark packets with partial path information when packets traverse routers through the Internet. The routers with the proposed IP traceback method can interoperate seamlessly with legacy routers and be incrementally deployable. The simulation reveals that our method requires fewer numbers of marked packets and takes less time to reconstruct the attacking paths, and has lower false combination rate in comparison with the previous works [10, 13, 15]. Furthermore, by our method, a victim does not need to maintain the network topology while it reconstructs attacking paths.


Keywords: IP traceback, probabilistic packet marking, Chinese remainder theorem, attacking path reconstruction, IP spoofing

  Retrieve PDF document (JISE_201106_12.pdf)