Advertisement

Modified Probabilistic Packet Marking Algorithm for IPv6 Traceback Using Chinese Remainder Theorem

  • Y. BhavaniEmail author
  • V. Janaki
  • R. Sridevi
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 8)

Abstract

Denial of Service (DoS) attack is creating a major problem to the internet security. Probabilistic Packet Marking (PPM) algorithm suggested a methodology to overcome the DoS attacks. This methodology selects a packet based on probability to store a part of the IP address of the router in the attack path. The victim combines the marked parts of the IP address, to form the IP address in the attack path. These combinations also contain IP address of routers which are not part of the attack path. They are therefore called false positives. To overcome this drawback we proposed Modified Probabilistic Packet Marking (MPPM) algorithm for IPv6. The packets are now marked with the unique value and this unique value is calculated using Chinese Remainder Theorem (CRT) for every IP address of the router in the attack path. This technique requires less number of marked packets to find the exact IP address, thus reducing the number of false positives. Though IPv6 header length is four times that of IPv4, we could successfully obtain the exact IP address of all the routers in the attack path.

Keywords

IP traceback Modified probabilistic packet marking algorithm Chinese remainder theorem Ipv6 

References

  1. 1.
    Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical Network Support for IP Traceback. In: ACM SIGCOMM conference, vol. 30. Issue 4, pp 295–306 (2000).Google Scholar
  2. 2.
    Song, D.X., Perrig, A.: Advanced and Authenticated Marking Schemes for IP Traceback. In: IEEE INFOCOM, pp. 878–886 (2001).Google Scholar
  3. 3.
    Dean, D., Franklin, M., Stubblefield, A.: An Algebraic Approach to IP Traceback. ACM Trans. Information and System Security, pp. 3–12 (2001).Google Scholar
  4. 4.
    Harsha K. Kalutarage., Siraj A. Shaikh., Indika P. Wickramasinghe., Qin Zhou., Anne E. James.: Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks. Computers and Electrical Engineering, vol. 47. pp. 327–344, (2015).Google Scholar
  5. 5.
    Park, K., Lee H.: On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial-of-Service Attacks. In: IEEE INFOCOM (2001).Google Scholar
  6. 6.
    Marion Vasseur., Xiuzhen Chen., Rida Khatoun., Ahmed Serhrouchni.: Survey on Packet Marking Fields and Information for IP Traceback. In: International Conference on Cyber Security of Smart cities, Industrial Control System and Communications (SSIC) (2015).Google Scholar
  7. 7.
    Karanpreet Singh., Paramvir Singh., Krishan Kumar.: A systematic review of IP traceback schemes for denial of service attacks. Computers & Security, vol. 56. pp 111–139, (2016).Google Scholar
  8. 8.
  9. 9.
    Xuan-Hien Dang, Emil Albright, Abdullah.: Performance analysis of probabilistic packet marking in IPv6. Computer Communications, vol. 30, pp 3193–3202 (2007).Google Scholar
  10. 10.
    Yulong Wang, Sui Tong, Yi Yang.: A practical hybrid IP traceback method for IPv6. Journal of Convergence Information Technology, vol. 7. pp. 173–182, (2012).Google Scholar
  11. 11.
    M. Hamedi-Hamzehkolaie., Chi Chen., Xue Tian., Reza Sanei., Masoud Khalil Nezhad., “Bee-Based IP Traceback”, 11th International Conference on Fuzzy Systems and Knowledge Discovery, pp 968–972 (2014).Google Scholar
  12. 12.
    Syed Obaid Amin, Myung Soo Kang, and Choong Seon Hong,: A light weight IP Traceback mechanism on IPv6. In: EUC workshops, LNCS 4097, pp. 671–680, (2006).Google Scholar
  13. 13.
    Long Cheng., Dinil Mon Divakaran., Wee Yong Lim., and Vrizlynn L. L.: Opportunistic Piggyback Marking for IP Traceback. IEEE Transactions on Information Forensics and Security, vol. 11. pp 2, (2016).Google Scholar
  14. 14.
    Bhavani Y., Janaki V., Sridevi R.: IP traceback through modified probabilistic packet marking algorithm using Chinese remainder theorem. Ain Shams Engineering Journal, vol. 6, pp 715–722, (2015).Google Scholar
  15. 15.
    Ahmad Fadlallah., “Adaptive Probabilistic Packet Marking Scheme for IP Traceback”, Computer Applications and Information Systems (WCCAIS), (2014).Google Scholar
  16. 16.
    Stephen, E., Deering, Robert, M., Hinden, Internet Protocol: Version 6 (IP v6) Specification, RFC 2460 (1998).Google Scholar
  17. 17.
    Bhavani, Y., Janaki, V., Sridevi, R.: IP traceback through Modified Probabilistic Packet Marking algorithm. In: IEEE Region 10 Conference TENCON (2013).Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.Department of Information TechnologyKakatiya Institute of Technology and ScienceWarangalIndia
  2. 2.Department of Computer Science and EngineeringVaagdevi College of EngineeringWarangalIndia
  3. 3.Department of Computer Science and EngineeringJawaharlal Nehru Technological University HyderabadHyderabadIndia

Personalised recommendations