Hash-based IP traceback
Top Cited Papers
- 27 August 2001
- proceedings article
- Published by Association for Computing Machinery (ACM)
- Vol. 31 (4) , 3-14
- https://doi.org/10.1145/383059.383060
Abstract
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. Even in the absence of any deliberate attempt to disguise a packet's origin, wide-spread packet forwarding techniques such as NAT and encapsulation may obscure the packet's true source. Techniques have been developed to determine the source of large packet flows, but, to date, no system has been presented to track individual packets in an efficient, scalable fashion.We present a hash-based technique for IP traceback that generates audit trails for traffic within the network, and can trace the origin of a single IP packet delivered by the network in the recent past. We demonstrate that the system is effective, space-efficient (requiring approximately 0.5% of the link capacity per unit time in storage), and implementable in current or next-generation routing hardware. We present both analytic and simulation results showing the system's effectiveness.Keywords
This publication has 7 references indexed in Scilit:
- Hardware support for a hash-based IP tracebackPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Practical network support for IP tracebackPublished by Association for Computing Machinery (ACM) ,2000
- Trajectory sampling for direct traffic observationPublished by Association for Computing Machinery (ACM) ,2000
- Summary cache: a scalable wide-area Web cache sharing protocolIEEE/ACM Transactions on Networking, 2000
- End-to-end Internet packet dynamicsIEEE/ACM Transactions on Networking, 1999
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979
- Space/time trade-offs in hash coding with allowable errorsCommunications of the ACM, 1970