2013
DOI: 10.1186/1687-417x-2013-5
|View full text |Cite
|
Sign up to set email alerts
|

IP traceback through (authenticated) deterministic flow marking: an empirical evaluation

Abstract: In this paper, we present a novel approach to IP traceback -deterministic flow marking (DFM). We evaluate this novel approach against two well-known IP traceback schemes. These are the probabilistic packet marking (PPM) and the deterministic packet marking (DPM) techniques. In order to do so, we analyzed these techniques in detail in terms of their performances and feasibilities on five Internet traces. These traces consist of Darpa 1999 traffic traces, CAIDA October 2012 traffic traces, MAWI December 2012 tra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 28 publications
0
11
0
Order By: Relevance
“…In the packet marking level, a packet is marked regardless of its relation with other packets in traffic. However, in the flow‐marking level, a limited number of packets are marked, which their 5 tuples are the same, ie, source and destination IP address, source and destination port number, and type protocol layer 4. In the flow‐marking level, the limited marked packets are representative of all packets in the flow.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the packet marking level, a packet is marked regardless of its relation with other packets in traffic. However, in the flow‐marking level, a limited number of packets are marked, which their 5 tuples are the same, ie, source and destination IP address, source and destination port number, and type protocol layer 4. In the flow‐marking level, the limited marked packets are representative of all packets in the flow.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, in terms of sending traceback data to a victim's system, the marking techniques are classified into two categories. These two groups are in‐band, in which the traceback data are marked in the header of the packet or a packet's header of flow and out‐of‐band, in which for a specific number of packets that are passed through the router (for example, 20 000 packets), a new packet is generated (Internet Control Message Protocol [ICMP]) and the traceback data are stored in the generated packet and sent to the destination.…”
Section: Related Workmentioning
confidence: 99%
“…UFM is developed based on our previous proposal, DFM [1]- [3]. DFM marks every flow, instead of every packet.…”
Section: Unique Flow Marking Ufmmentioning
confidence: 99%
“…Based on the work in [1] [2], the best value of K is either 2, so that the size of each fragment is 32 bits, or 5, so that the size of each fragment is 16 bits. Moreover, based on several previous studies on the IP traceback [10], it is possible to use the identification and the flag fields of the IP header as a 16-bit marking field, or to use the identification, the flag and the fragment offset fields of the IP header as a 32-bit marking field.…”
Section: A Ufm Encoding Module (Ufme)mentioning
confidence: 99%
See 1 more Smart Citation