IP Traceback Algorithm for DoS/DDoS Attack

  • Hong-bin Yim
  • Jae-il Jung
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4238)


DoS(Denial of Service) / DDoS(Distributed Denial of Service) attacks threaten Internet security nowadays. However, the current Internet protocol and backbone network do not support traceback to know attacker’s real location. Many methods to defend DoS/DDoS attack have been proposed. However these kinds of methods cause network overhead because they use many packets to reconstruct an attack path. In this paper we propose effective probability marking methods and a pushback algorithm to reduce network overhead.


Edge Router Network Overhead Information Packet Probabilistic Packet Attack Path 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Lee, H.C.J., Thing, V.L.L., Xu, Y., Ma, M.: ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 124–135. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  2. 2.
    Internet Protocol : Darpa Internet Program Protocol Specificatio, RFC791Google Scholar
  3. 3.
    Park, K., Lee, H.: On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. In: Proc. IEEE INFOCOM 2001, pp. 338–347 (2001)Google Scholar
  4. 4.
    Song, D.X., Perrig, A.: Advanced and Authenticated Marking Scheme for IP Traceback. In: Proc. infocom, vol. 2, pp. 878–886 (2001)Google Scholar
  5. 5.
    Kai, C., Xiaoxin, H., Ruibing, H.: DDoS Scouter: A Simple IP Traceback Scheme, http://blrc.edu.cn/blrcweb/publication/kc1.pdf
  6. 6.
    Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical Network Support for IP Traceback. In: SIGCOMM (2000)Google Scholar
  7. 7.
    Stoica, I., Zhang, H.: Providing Guaranteed Services Without Per Flow Management. In: SIGCOMM (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Hong-bin Yim
    • 1
  • Jae-il Jung
    • 1
  1. 1.Department of Electrical and Computer Engineering Hanyang UniversitySungdong-gu, SeoulKorea

Personalised recommendations