UC Santa Cruz UC Santa Cruz Previously Published Works

Size: px
Start display at page:

Download "UC Santa Cruz UC Santa Cruz Previously Published Works"

Transcription

1 UC Santa Cruz UC Santa Cruz Previously Publishe Works Title Towars Loop-Free Forwaring of Anonymous Internet Datagrams that Enforce Provenance Permalink Author Garcia-Luna-Aceves, J.J. Publication Date Peer reviewe escholarship.org Powere by the California Digital Library University of California

2 Towars Loop-Free Forwaring of Anonymous Internet Datagrams that Enforce Provenance J.J. Garcia-Luna-Aceves 1,2 1 Department of Computer Engineering, University of California, Santa Cruz, CA Palo Alto Research Center, Palo Alto, CA jj@soe.ucsc.eu Abstract The way in which aressing an forwaring are implemente in the Internet constitutes one of its biggest privacy an security challenges. The fact that source aresses in Internet atagrams cannot be truste makes the IP Internet inherently vulnerable to DoS an DDoS attacks. The Internet forwaring plane is open to attacks to the privacy of atagram sources, because source aresses in Internet atagrams have global scope. The fact an Internet atagrams are forware base solely on the estination aresses state in atagram heaers an the next hops store in the forwaring information bases (FIB) of relaying routers allows Internet atagrams to traverse loops, which wastes resources an leaves the Internet open to further attacks. We introuce PEAR (Provenance Enforcement through Aressing an Routing), a new approach for aressing an forwaring of Internet atagrams that enables anonymous forwaring of Internet atagrams, eliminates many of the existing DDoS attacks on the IP Internet, an prevents Internet atagrams from looping, even in the presence of routing-table loops. I. INTRODUCTION One of the biggest challenges facing the future of the Internet is that its vulnerabilities to DoS an DDoS attacks are inherent in the algorithms use in the Internet to: (a) assign aresses to hosts, routers, an evices; (b) inclue source aresses in Internet atagrams; (c) map aresses to routes; () bin names to locations in the Internet; an (e) forwar Internet atagrams. In theory, the goal of assigning Internet Protocol (IP) aresses to entities an incluing the source an estination IP aress in each atagram is to have system-frienly ientifiers that: state the origin an estination of Internet atagrams base on topological locations where content, services, or evices are mae available; an can be matche efficiently against store information by routers an en systems. However, an IP aress simply enotes the point of attachment of a host or router to a network with a given IP aress range, without any topological information other than the aggregation of IP aresses. Furthermore, IP aresses are assigne to entities inepenently of the establishment of routes to services, content, evices, groups, or any entity in general. As a result, routing protocols (e.g., OSPF, BGP) an irectory services (e.g., DNS) map names use to enote entities (e.g., omain names) to names that enote points of attachment to networks (IP aresses). In aition to this, the Internet surreners any control of the allocation of source IP aresses to Internet atagrams, because the origin of an Internet atagram specifies the source aress of the atagram inepenently of any forwaring mechanism an en noes are allowe to specify IP source aresses. Because of the algorithms use to assign IP aresses to entities an write source aresses into Internet atagrams, the source aress of an Internet atagram fails to convey its provenance correctly. The recipient of an Internet atagram is unable to authenticate the claime IP aress of the source of the atagram base solely on the basic operation of the forwaring plane of the IP Internet. The receivers of Internet atagrams are force to use aitional mechanisms an information to cope with the fact that a source aress nee not enote the vali provenance of an Internet atagram. Furthermore, these mechanisms are far more complex than the simple mechanism use by sources of Internet atagrams to state the origins of atagrams. In aition, IP aresses are globally unique an assigne on a long-term basis, which makes it easier for attackers to plan an mount attacks. This constitutes a major vulnerability to DDoS attacks in the current Internet architecture. In aition to the above, a router forwars an Internet atagram to its next hop base solely on the estination aress state in the atagram an the next hop liste in its forwaring information base (FIB). This is a problem in the presence of routing-table loops, because it is possible for Internet atagrams to traverse loops. The only approach use toay is to inclue a time-to-live (TTL) fiel in the atagram heaer that is ecremente at each hop of the path traverse by the atagram, an to rop an Internet atagram after the TTL value reaches zero. The contribution of this paper is to present a set of algorithms that we call PEAR (Provenance Enforcement through Aressing an Routing), an which prevent Internet atagrams from traversing forwaring loops, makes the ientity of the origin of an Internet atagram anonymous to the rest of the Internet, an enforces the provenance of an Internet atagram. Section II summarizes current efenses against DDoS flooing attacks. The main objective of this review of prior work is to point out that efening against large DDoS flooing attacks is virtually impossible without changing the basic algorithms use for the allocation of aresses to Internet atagrams, the mapping of aresses to routes an connections, an the protection of information carrie in Internet atagrams. Currently, attackers spen far less energy an time mounting

3 attacks than their targets spen efening against them. Section III introuces a simple approach to ensure that Internet atagrams never loop, even when routing tables contain long-term or short-term routing-table loops. The approach operates by having the FIB entry for an aress prefix state the next hop an the hop-count istance to the prefix, an by using the TTL file of a atagram to enforce an orering constraint ensuring that a router can forwar a atagram only to a next hop that is strictly closer to the intene estination. Section IV introuces a receiver-initiate aress allocation algorithm, a simple aress swapping function, an an oneman routing algorithm operating in the ata plane, which together ensure that the origins of Internet atagrams remain anonymous to any routers processing the atagram, an that anonymous sources of atagrams can receive traffic from public estinations over the reverse paths travele by their anonymous atagrams. II. CURRENT DEFENSES AGAINST DDOS ATTACKS The methos use to launch DDoS attacks toay consist of: (a) sening malforme packets to the victims to confuse protocols or applications; (b) isrupting the connectivity of legitimate users by exhausting banwith, router processing capacity, or network resources; an (c) isrupting services to legitimate users by exhausting the resources of servers (sockets, CPU, memory, or I/O banwith). We aress DDoS flooing attacks aime at isrupting the connectivity an services offere to legitimate users. Four types of efenses against these attacks have been propose to ate [3], [12], [26], [30], [37]: Attack prevention, which aims at stopping attacks before they reach their targets; attack etection, which attempts to ientify the existence of attacks when they occur; attack source ientification, which tries to locate the source of the attack inepenently of the information containe in packets use in the attack; an attack reaction, which aims at eliminating or minimizing the impact of attacks. The attack prevention approaches propose to ate focus on routers filtering IP atagrams with spoofe source IP aresses (e.g., [5], [13], [18], [22], [25], [28]), or routers aing provenance information to IP atagrams The limitations of existing packet-filtering approaches are that: (a) existing filters provie only coarse-graine escriptions of vali source IP aresses; (b) filters are vulnerable to asymmetric routing an the ynamics of routing protocols; (c) it can be ifficult to etermine which source IP aresses are vali because of the complexity of the network topology; an () the exiting approaches use to upate filters either incur substantial signaling overhea or are very slow to upate filters with new ata. Prior approaches base on aing provenance information require too much effort by the attacke network, because they involve the use an issemination of secret keys to mark IP atagrams, an some even require aitional heaers. Several efense approaches have focuse on etecting specific DoS an DDoS attacks (e.g., [2], [7], [16], [29], [39]) or anomaly etection (e.g., [10], [21], [40]). These approaches monitor the behavior of specific protocols or the network in an attempt to etect flow anomalies. The key limitation of efense approaches base on etection is that they must rely on a number of assumptions regaring the behavior of legitimate users, an attackers can aopt countermeasures to evae etection. Some DoS attacks can be etecte, given that only a few computer systems are attackers an compromise system must behave ifferently than benign users to exhaust the resources of their targets. However, the problem is far more ifficult for DDoS attacks, which involve many compromise hosts that can mimic legitimate users an nee not change the normal pattern of protocol traffic to be effective. Prior approaches for the ientification of attack sources have focuse on tracing the origins of attacks by explicit signaling or marking atagrams with the paths they traverse (e.g., [9], [31], [33], [34], [35], [41], [42]). Some path marking techniques have also been combine with filtering. The main limitations of these approaches inclue that: it may be ifficult to infer the attack paths in large DDoS attacks; some approaches can consume consierable storage, processing, an communication overhea; some path markings are not entirely unique; an tracebacks an markings become useful only after the attacks have consume network resources an have reache their targets. Similarly, prior approaches aime at filtering Internet atagrams with spoofe IP aresses are only partially effective, because they change router behavior to enact filtering without changing the way in which IP source aresses are assigne to Internet atagrams [5], [13], [18], [22], [25], [28], or the fact that atagram forwaring is inepenent of the istances to aress prefixes state in routing tables. Approaches that introuce aitional information to enote the provenance of a atagram are ifficult to implement an cannot be eploye at Internet scale, because they require public key infrastructure (PKI) support. For example, HIP [27] requires a PKI that is globally eploye to prevent attackers from simply minting unlimite numbers of host ientifiers use in HIP. AIP [4] on the other han assumes a flat aressing space that cannot be applie at Internet scale, is vulnerable to malicious hosts creating unlimite numbers of EIDs, an oes not offer an efficient way to recovering from compromise private keys corresponing to the AIP aresses of hosts or accountability omains. Similar limitations exist in approaches that a path information (e.g., [8], [23]). Attack-reaction approaches seek to minimize the amage cause by attacks by protecting bottleneck resources [24]. The mechanisms that have been propose inclue reucing the state neee to execute specific communication protocols (TCP in particular [6], [11], [32]); manage resources, shape traffic, an increase the capacity of servers [19], [36]; an secure the communication between confirme users an servers [20], [38]. Attempting to reuce connection state in TCP is a goo objective in all TCP implementation moifications; however, they have not caught on because of the inconsistencies they introuce in the establishment an termination of connections. Approaches that attempt to manage bottleneck resources are not effective, because such resources are share fairly by DDoS traffic, leaving limite resources for vali users. On the

4 other han, prior approaches that attempt to secure the communication between vali users an resources are overly complex, because they buil new mechanisms to enforce provenance an obfuscation on top of existing Internet methos for naming, aressing an routing. III. ELIMINATING FORWARDING LOOPS IN THE INTERNET The Internet atagram forwaring algorithm is base on FIB entries that simply state the next hops for IP aress prefixes. To forwar a atagram intene to estination aress, an IP router looks up its FIB to obtain the best match for among the entries liste in its FIB for known IP aress prefixes an ecrements the TTL of the atagram. Two approaches are currently use to cope with the occurrence of forwaring loops in Internet forwaring. In the forwaring plane, the time-to-live (TTL) fiel of an Internet atagram is use to iscar a atagram after it circulates a forwaring loop too many times. In the control plane, routing protocols (e.g., OSPF an EIGRP) are use to reuce or eliminate the existence of routing loops. However, even if a loop-free routing protocol is use in the control plane, a atagram may still circulate a forwaring loop while routing tables are inconsistent among routers. We propose using FIBs to ensure that forwaring ecisions in the ata plane are consistent with the routing information maintaine by the routing protocol operating in the control plane. The FIB entry store at router i for aress prefix states the minimum-hop istance H i to the prefix in aition to the next hop n to the prefix. We assume for convenience that a istance state in a FIB is a minimum-hop count to a estination. We enote by P k [s k,, T k, ID o ](p) an Internet atagram sent by router k with a heaer that contains a source aress of local scope (s k ), a estination aress of global scope (), a TTL value (T k ), an an origin ID (ID o ), plus payloa ata p. Router i uses the following rule to forwar such a atagram using its FIB within a network. TTL-base FIB Rule (TFR): Router i accepts to forwar P k [s k,, T k, ID o ](p) from router k towars the best-match prefix for if T k > H i. If router i accepts P k [s k,, T k, ID o ](p), it sets T i = H i an forwars atagram P i [s i,, T i, ID o ](p) to its next hop towars prefix. A router simply rops a atagram intene for a estination aress of global scope with a TTL value that oes not satisfy TFR. TFR consists of imposing an orering constraint on the traitional Internet atagram forwaring algorithm base on FIB entries, an making the TTL value of the atagram equal to the istance store in the FIB for the intene estination, rather than simply ecrementing its value. The following theorem proves that TFR eliminates IP forwaring loops. Theorem 1: No Interest can traverse a forwaring loop in an IP network in which TFR is use to forwar atagrams. Proof: Consier a network in which TFR is use an assume for the sake of contraiction that routers in a forwaring loop L of h hops {v 1, v 2,..., v h, v 1 } forwar a atagram for estination along L with no router in L etecting that the atagram has traverse loop L. Given that L exists by assumption, router v k L must forwar P v k [s v k,, T v k, ID o ](p) to router v k+1 L for 1 k h 1, an router v h L must forwar P v h [s v h,, T v h, ID o ](p) to router v 1 L. Accoring to TFR, if router v k (1 < k h) forwars P v k [s v k,, T v k, ID o ](p) to router v k+1 as a result of receiving P v k 1 [s v k 1,, T v k 1, ID o ](p) from router v k 1, then it must be true that T v k 1 > H v k, where is the aress prefix that is the best match for estination. Similarly, if router v 1 forwars P v1 [s v1,, T v1, ID o ](p) to router v 2 as a result of receiving P v h [s v h,, T v h, ID o ](p) from router v h, then it must be true that T v h > H v1. However, these results constitute a contraiction, because they imply that H v k > H v k for 1 k h. Therefore, the theorem is true. Theorem 1 is inepenent of whether the network is static or ynamic, or whether routers use single-path routing of multipath routing. The orering constraint of TFR is essentially the same loop-free conition first introuce in DUAL [14]. The ifference between the way in which the orering constraint is use in TFR an in DUAL is that TFR establishes istancebase orering in the ata plane to forwar atagrams base on existing FIB entries, while DUAL establishes istance-base orering in the control plane to buil FIB entries that are then use to etermine how to forwar atagrams. As state, TFR is only applicable within an autonomous system (AS) in which the same routing protocol is use to obtain minimum-hop istances to estinations. However, applying the approach use in TFR across autonomous systems is relatively straightforwar. A atagram nees to carry two hop counts, one that states the AS hop count to the estination AS, an another one stating the istance to the intene estination within the same AS or the gateway connecting to the next AS along the path to the estination AS. IV. ANONYMOUS DATAGRAM FORWARDING Since the introuction of atagram packet switching by Baran [1], the ientifiers use to enote the estinations an sources of atagrams have ha global scope. Toay, the FIBs maintaine by Internet routers list entries that state the next hop to each known IP aress range of global scope. However, five important observations can be mae to argue that atagram forwaring oes not have to be limite to Baran s original esign. First, the purpose of having aresses in atagram heaers is to enable hop-by-hop atagram forwaring base on fast lookups of estination-base routing tables, which oes not require aresses to have global, longterm meaning. Secon, assigning IP aresses to hosts on a long-term basis as if they were names is not necessary an enables attackers to take avantage of the quasi-static nature of such ientifiers. Thir, there is no technical reason for the origin of an IP atagram to be the entity that assigns the source IP aress of the atagram. Fourth, having the estination of an IP atagram ascertain the provenance of a atagram without any assistance from the routing infrastructure imposes

5 too much effort on the estination an is one after atagrams with spoofe aresses have waste network resources. Fifth, the packet-filtering schemes propose to ate to aress DDoS attacks o not take full avantage of the istance information maintaine in routing tables. Our approach consists of using IP aresses of local scope to enote anonymous sources of Internet atagrams, an introucing an on-eman routing algorithm to maintain routes to such aresses. Similar to the approach in [17], we avocate Internet atagram forwaring over symmetric paths in orer to support the forwaring of Internet atagrams using IP aresses with local scope. The rest of this section escribes the mechanisms for supporting anonymous atagram forwaring in the Internet using a simple example. A formal escription of the algorithms is omitte for brevity. A. Receiver-Initiate Source Aress Assignment Each router announces a continuous interval of IP aresses (local interval) that the router consiers vali local-scope aresses use to enote sources or estinations of Internet atagrams. Router i maintains a local-interval set table (LIST i ) that lists the local interval announce by each neighbor router k (LI i (k)) to router i, an the local interval announce by router i to its neighbors (LI i (i)). All local intervals are of equal length LI, an hence a local interval is uniquely efine by the IP aress at the start of the interval. The start of local interval LI i (k) is enote by LI i (k)[s]. Given this, router i can easily map an IP aress of local scope x LI i (i) to a corresponing IP aress of local scope y that is acceptable to neighbor k with the following bijection, where ɛ is a constant known only to router i: y ɛ + x LI i (i)[s] + LI i (k)[s] mo LI (1) B. Forwaring Information Store an Exchange PEAR is transparent to en hosts. Clients an servers simply use IP atagrams without moification. The aresses specifie in a atagram sent between a host an router may be of local or global scope. A host that originates atagrams must use an IP aress taken from the local-interval set use by the ajacent router. To forwar Internet atagrams from an anonymous atagram source to a estination with an IP aress that has global scope, PEAR uses three aresses to forwar a atagram. A source IP aress of local scope enotes the originating router of the atagram at each hop of the path towars the estination. An IP aress of global scope enotes the intene estination. In aition, an IP aress of local scope, which we call the origin ID, is use to enote the host that originate the atagram. The TTL file of a atagram is use to enforce TFR at each router to forwar a atagram towars the best prefix match for estination aress of global scope. A router that receives a atagram from a host sets the TTL fiel of the atagram to equal its hop-count istance to the estination. Because the source IP aress an the origin ID state in a atagram have local scope, routers along the path from an anonymous source to a estination with a global-scope aress must establish forwaring state pointing back towars the anonymous source in orer for atagrams from to the anonymous source to be forware. Aitional forwaring tables are neee to accomplish this. Each router maintains a Hop-Specific Routing Table (HRT) to keep track of the next hops towars estinations enote by aresses that have hop-specific scope. Router i maintains HRT i, which is inexe using hop-specific IP aresses taken from LI i (i). An entry in HRT i states a hop-specific IP aress (HIP) use to enote a estination (HIP (HRT i ) LI i (i)), a next hop to that estination, (n(hrt i ) N i ), an a hop-specific aress mapping use to hanle collisions of hop-specific IP aresses (map(hrt i ) LI i (i)). HRT i [HIP, n, map] enotes a given entry in HRT i. A HIP use as the source IP aress in a atagram forware by router i is enote by SHIP D (i). Similarly, DHIP D (i) an OHIP D (i) are use to enote the estination IP aress an the origin IP of a atagram forware by router i, respectively.the origin IDs are not store in HRT entries. Each router uses the same bijection of Eq. (1) to map the origin ID state in a atagram it receives to the origin ID of the atagram it forwars towars its estination. Each router also maintains a Destination Routing Table (DRT) to reuce the amount of forwaring state neee in relaying routers. Router i maintains DRT i, which inexe using origin IDs receive in atagrams an lists entries corresponing to sources of atagrams that have inicate a estination aress that is irectly attache to router i. An entry in DRT i states an origin ID ((O(DRT i )) an a hopspecific IP aress ((HIP (DRT i )), both of which are in the local interval efine for router i. Fig. 1. Datagram forwaring using IP aress swapping with PEAR C. Forwaring of Datagrams from Anonymous Sources Routers that forwar a atagram from an anonymous source to a estination aress of global scope use their FIBs to etermine the next hop an establish forwaring state in their HRTs as the atagram is forware to allow atagrams to flow back to anonymous sources.

6 Figure 1 shows an example of the forwaring state establishe at relay routers between an anonymous source an a well-known estination to enable atagrams to be sent back to IP aresses of local scope. The example in the figure shows a client h initiating communication with a server assigne an aress that has network-wie scope an is part of an aress prefix liste in the forwaring information bases (FIB) maintaine by routers. It is assume that the client has obtaine the IP aress of the intene estination using the DNS or other means. The IP aress assigne to host h is s p an has only local scope at router p, i.e., other routers o not associate s p with the same host h. In the example, host h must use IP aress s p as its source aress. Router p accepts atagrams from host h only if the IP source aress in those atagrams is s p. The TTL fiel is not shown in the figure, but TFR is assume to be applie by each relay router. Starting with the router that receives a atagram from an attache host (router p in the example), routers establish forwaring state using a source IP aresses of local scope, an origin ID that is also an IP aress of local scope, an the estination aress. In the figure, a atagram forware between two routers towars the estination with global-scope aress is enote by P [x, : s x ], where x is a source IP aress of local scope, is the global-scope aress, an s x is an origin ID. The source IP aress an origin ID of a atagram being forware by router r to router n along the path from host h to aress (P h ) are taken from the local interval assigne by n to r (LI r (n)) using the bijection state in Eq. (1). In the example of Figure 1, router i has an exiting entry HRT i [15, q, 15] when it receives atagram P [15, : s i ] from router p q. The estination IP aress in the atagram has global scope an hence is forware base on its FIB. However, the source IP aress in the atagram receive from p collies with entry HRT i [15, q, 15]. Accoringly, router i selects HIP = 40, which is not use in any existing HRT entry; creates entry HRT i [40, p, 15], sets SHIP D (i) = f i (n)[40] = 550 an OHIP D (i) = f i (n)[s i ] = s n ; an forwars atagram P [550, : s n ] to router n. When router y receives P [1005, : s y ] from router n, it etermines that the host with aress y is locally attache. Accoringly, it creates an entry in DRT i with the tuple (s y, 1005) an passes atagram D[s y, ] to the host with IP aress. D. Forwaring of Datagrams to Anonymous Sources Routers use their HRTs to forwar atagrams to estinations enote with hop-specific aresses. Given that TFR is use when the entries in HRTs are establishe, the paths implie by HRT entries are loop-free. In Figure 1, when router i receives atagram P [, 550 : s i ] from router n, the fact that the estination aress in the atagram is in its local interval LI i (i) instructs router i to use HRT i for forwaring rather than its F IB i. To o so, router i computes the inverse function f 1 i (n)[550] = 40. Using HIP = 40 as the key in HRT i, router i obtains the next hop p an sets DHIP D (i) = 15. Router i also computes f 1 i (n)[s n ] = s i, sets OHIP D (i) = s i, an forwars forwars P [, 15 : s i ] to router p. In turn, router p uses f 1 i (p) to obtain the values of the estination aress an origin ID for the atagram it shoul forwar. However, given that p = f 1 i (p)[15] L p (p), router p obtains the local host that shoul receive the atagram. It computes f 1 i (p)[s i ] = s an forwars D[, s] to the host with IP aress s. E. Enforcing Anonymity an Provenance of Datagrams It is easy to show that PEAR enforces anonymity of atagrams, in the sense that no intruer can etermine the origin of a atagram simply by monitoring traffic over a link an reaing the heaers of atagrams. The reason an Internet atagram ivulges the ientity of its source is that source aresses have global scope an hence any relay router or intruer receiving the atagram can etermine its origin. Reucing the scope of a source aress to the specific hop where the atagram is being forware still allows intruers an relay routers to infer the ientity of the source in small networks. However, forcing each relay to use an aress from an aress space provie by the next hop eliminates the ability of an intruer or the receiving router to infer the true ientity of the atagram origin. This is the case even in small networks larger than two routers, unless the topology of the network is such that any traffic sent from a given router must be originate by the router (e.g., a leaf router). Even tough PEAR uses IP aresses of hop-specific scope to provie anonymity, routers can enforce correct provenance of atagrams by eliminating the ability of hosts or routers to inject arbitrary source IP aresses in atagrams being forware among truste routers implementing PEAR. An ingress router accepts a atagram from an attache host only if it has a source aress eeme vali for that host. Furthermore, the source IP aress an origin ID it uses in the atagram it forwars to the next hop must both be in the aress space provie by the next-hop router, an the same is true at every hop along the path to the estination. Therefore, it follows that any malicious host or team of routers attempting to inject atagrams with spoofe IP source aresses can be ientifie by the first truste router that oes not receive atagrams with correct source aresses. Furthermore, malicious atagrams using vali source aresses can be trace back to the first untruste router injecting the traffic, given the inuctive nature of the receiver-initiate source aress assignment an the simple bijection use at each hop to swap IP aresses to an from anonymous estinations. V. CONCLUSIONS AND FUTURE WORK We introuce the first approach for Internet atagram forwaring that eliminates forwaring loops even if routing tables contain routing-table loops. Base on the ability to eliminate forwaring loops, we also presente an approach that enables the origins of Internet atagrams to remain anonymous while enforcing the correct provenance of atagrams. As such, the propose forwaring scheme can be applie to eliminate

7 many of the existing DDoS attacks on the IP Internet, which are enable by the inability of Internet atagrams to enforce correct provenance. Aitional work is neee to formally escribe the specific DDoS countermeasures enable by PEAR. Equally important, TFR can be applie to inter-omain routing by utilizing two hop counts, one that takes effect across autonomous systems an another one that is use within an autonomous system. However, such cluster-base version of TFR has not been proven to be correct as is the case of TFR [15], [14] an this is an obvious next step. Lastly, even though we have avocate symmetric paths as aitional protection against DDoS attacks [17], the Internet has many asymmetric paths, an the propose scheme must be extrapolate to the case in which atagrams from s to follow a ifferent path than atagrams from to s. VI. ACKNOWLEDGMENTS This work was supporte in part by the Jack Baskin Chair of Computer Engineering at the University of California at Santa Cruz. REFERENCES [1] P. Baran, On Distribute Communications: I. Introuction fo Distribute Communication Networks, Memoranum RM-3420-PR, The RAND Corporation, Aug [2] S. Abelsaye et al., An Efficient Filter for Denial-of-Service Banwith Attacks, Proc. IEEE Globecom 03, [3] M. Abliz, Internet Denial of Service Attacks an Defense Mechanisms, Report No. TR , Univ. of Pittsburg, [4] D. Anersen, Accountable Internet Protocol (AIP), Proc. ACM SIG- COMM 08, [5] F. Baker, Requirements for IP Version 4 Routers, RFC 1812, [6] D.J. Bernstein, SYN Cookies, [7] R.B. Blazek et al., A Novel Approach to Detection of Denial-of- Service Attacks via Aaptive Sequential an Batch-Sequential Change- Point Detection Methos, Proc. IEEE Systems, Man, an Cybernetics Information Assurance Workshop 01, [8] A. Bremler-Barr an H. Levy, Spoofing Prevention Metho, Proc. IEEE INFOCOM 05, March [9] H. Burch an B. Cheswitck, Tracing Anonymous Packets to Their Approximate Source, Proc. 14th Systems Amin. Conference, [10] D.E. Denning, An Intrusion Detection Moel, IEEE Trans. Softw. Eng., [11] W. Ey, TCP SYN Flooing Attacks an Common Mitigations, RFC 4987, [12] T. Ehrenkranz an J. Li, On The state of IP Spoofing Defense, ACM Trans. Internet Technology, Vol. 9, No. 2, [13] P. Ferguson an D. Senie, Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Aress Aress Spoofing, RFC 2827, [14] J.J. Garcia-Luna-Aceves, A Unifie Approach to Loop-Free Routing Using Distance Vectors or Link States, Proc. ACM SIGCOMM 89, Aug [15] J.J. Garcia-Luna-Aceves, A Fault-Tolerant Forwaring Strategy for Interest-base Information Centric Networks, Proc. IFIP Networking 15, May [16] T.M. Gil an M. Poletto, MULTOPS: A Data-Structure for Banwith Attack Detection, Proc. USENIX Security Symposium 01, [17] M. Hanley an A. Greenhalgh, Steps Towars a DoS-Resistant Internet Architecture, Proc. ACM SIGCOMM 04 Workshops, Aug [18] C. Jin et al., Hop-Count Filtering: An Effective Defense against Spoofe DDoS Attacks, Proc. 10th ACM Conf. on Computer an Communications Security, [19] F. Kargl et al., Protecting Web Servers from Distribute Denial of Service Attacks, Proc. 10th Int l Worl Wie Web Conference, [20] A. Keromytis et al., SOS: Secure Overlay Services, Proc. ACM SIGCOMM 02, [21] R.R. Kompella et al., On Scalable Attack Detection in The Network, Proc. ACM IMC 04, [22] J. Li et al., SAVE: Source Aress Valiity Enforcement Protocol, Proc. IEEE INFOCOM 02, [23] X. Liu et al., Passport: Secure an Aoptable Source Authentication, Proc. USENIX 08, [24] J.K. Millen, A Resource Allocation Moel for Denial of Service, Proc. IEEE Symposium on Security an privacy, [25] J. Mirkovic et al., Attacking DDoS at The Source, Proc. IEEE ICNP 02, [26] J. Mirkovic an P. Reiher, A Taxonomy of DDoD Attack an DDOs Defense Mechanisms, ACM SIGCOMM CCR, Vol. 34, No.2, April [27] R. Moskowitz et al., Host Ientity Protocol, RFC 5201, April [28] K. Park an H. Lee, On The Effectiveness of Router-Base Packet Filtering for Distribute DoS Attack Prevention in Power-Law Internets, Prof. ACM SIGCOMM 01, [29] T. Peng et al., Proactively Detecting Distribute Denial of Service Attacks Using Source IP Aress Monitoring, Proc. IFIP Networkig 04, [30] T. Peng et al., Survey of Network-base Defense Mechanisms Countering The DoS an DDoS Problems, ACM Computing Surveys, Vol. 39, No. 1, April [31] S. Savage et al., Practical Network Support for IP Traceback, Proc. ACM SIGCOMM 00, [32] C.L. Schuba et al., Analysis of A Denial of Service Attack on TCP, Proc. IEEE Symposium on Security an Privacy 97, [33] A. Snoeren et al., Hash-base IP Traceback, Proc. ACM SIGCOMM 01, [34] D.X. Song an A. Perrig, Avance an Authenticate Marking Schemes for IP Traceback, Proc. IEEE INFOCOM 01, [35] R. Stone, Centertrack: An IP Overlay Network for Tracking DoS Floos, Proc. 9th USENIX Security Symposium, [36] O. Spatscheck an L. Petersen, efening against Denial of Service Attacks in Scout, Proc. 3th Symposium on Operating Systems Design an Implementation, [37] S. Taghavi et al., A Survey of Defense Mechanisms Against Distribute Denial of Service (DDoS) Flooing Attacks, IEEE Comm. Surveys an Tutorials, Vol. 15, No. 3, 2013 [38] U. Tupakula an V. Varaharajan, A Practial Metho To Counteract Denial of Service Attacks, Proc. ACSC 03, [39] H. Wang et al., Detecting SYN Flooing Attacks, Proc. IEEE INFO- COM 02, [40] P.D. Williams et al., CDIS: Towars a Computer Immune System fore Detecting Network Intrusions, Proc. Int l Symp. on Recent Avances on Intrusion Detection, [41] A. Yaar et al., Pi: A Path Ientification Mechanism to Defen Against DDoS Attack, Proc. IEEE Symposium on Security an Privacy, [42] A. Yaar et al., StackPi: New Packet Marking an Filtering Mechanisms for DDoS an IP Spoofing Defense, IEEE JSAC, 2006.

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Adjusted Probabilistic Packet Marking for IP Traceback

Adjusted Probabilistic Packet Marking for IP Traceback Ajuste Probabilistic Packet Marking for IP Traceback Tao Peng, Christopher Leckie, an Kotagiri Ramamohanarao 2 ARC Special Research Center for Ultra-Broaban Information Networks Department of Electrical

More information

MODULE VII. Emerging Technologies

MODULE VII. Emerging Technologies MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking

More information

Experience with SPM in IPv6

Experience with SPM in IPv6 Experience with SPM in IPv6 Mingjiang Ye, Jianping Wu, and Miao Zhang Department of Computer Science, Tsinghua University, Beijing, 100084, P.R. China yemingjiang@csnet1.cs.tsinghua.edu.cn {zm,jianping}@cernet.edu.cn

More information

Two Dimensional-IP Routing

Two Dimensional-IP Routing Two Dimensional-IP Routing Mingwei Xu Shu Yang Dan Wang Hong Kong Polytechnic University Jianping Wu Abstract Traitional IP networks use single-path routing, an make forwaring ecisions base on estination

More information

Various Anti IP Spoofing Techniques

Various Anti IP Spoofing Techniques Various Anti IP Spoofing Techniques Sonal Patel, M.E Student, Department of CSE, Parul Institute of Engineering & Technology, Vadodara, India Vikas Jha, Assistant Professor, Department of CSE, Parul Institute

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

UC Santa Cruz UC Santa Cruz Previously Published Works

UC Santa Cruz UC Santa Cruz Previously Published Works UC Santa Cruz UC Santa Cruz Previously Published Works Title CORD: Content Oriented Routing with Directories Permalink https://escholarship.org/uc/item/8g21p4hr Authors Garcia-Luna-Aceves, J.J. Li, Q.

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

PAPER. 1. Introduction

PAPER. 1. Introduction IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

Topics. Computer Networks and Internets -- Module 5 2 Spring, Copyright All rights reserved.

Topics. Computer Networks and Internets -- Module 5 2 Spring, Copyright All rights reserved. Topics Internet concept an architecture Internet aressing Internet Protocol packets (atagrams) Datagram forwaring Aress resolution Error reporting mechanism Configuration Network aress translation Computer

More information

MODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services

MODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services MODULE V Internetworking: Concepts, Aressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, An En-To-En Services Computer Networks an Internets -- Moule 5 1 Spring, 2014 Copyright

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India

@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India Secure and Flexible Communication Technique: Implementation Using MAC Filter in WLAN and MANET for IP Spoofing Detection Ashwini R. Vaidya 1, Siddhant Jaiswal 2 1,2 Department of Computer Science, G.H.

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

Inter-domain routing validator based spoofing defence system

Inter-domain routing validator based spoofing defence system University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2010 Inter-domain routing validator based spoofing defence system Lei

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network

An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network Lizhong Xie, Jun Bi, and Jianpin Wu Network Research Center, Tsinghua University, Beijing, 100084, China

More information

A Light-Weight Forwarding Plane for Content-Centric Networks

A Light-Weight Forwarding Plane for Content-Centric Networks A Light-Weight Forwarding Plane for Content-Centric Networks J.J. Garcia-Luna-Aceves 1,2 and Maziar Mirzazad-Barijough 2 1 Palo Alto Research Center, Palo Alto, CA 94304 2 Department of Computer Engineering,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY Gayatri Chavan,, 2013; Volume 1(8): 832-841 T INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK RECTIFIED PROBABILISTIC PACKET MARKING

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

6.823 Computer System Architecture. Problem Set #3 Spring 2002

6.823 Computer System Architecture. Problem Set #3 Spring 2002 6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

TO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM

TO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM TO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM Anburaj. S 1, Kavitha. M 2 1,2 Department of Information Technology, SRM University, Kancheepuram, India. anburaj88@gmail.com,

More information

An Efficient and Practical Defense Method Against DDoS Attack at the Source-End

An Efficient and Practical Defense Method Against DDoS Attack at the Source-End An Efficient and Practical Defense Method Against DDoS Attack at the Source-End Yanxiang He Wei Chen Bin Xiao Wenling Peng Computer School, The State Key Lab of Software Engineering Wuhan University, Wuhan

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Multivariate Correlation Analysis based detection of DOS with Tracebacking

Multivariate Correlation Analysis based detection of DOS with Tracebacking 1 Multivariate Correlation Analysis based detection of DOS with Tracebacking Jasheeda P Student Department of CSE Kathir College of Engineering Coimbatore jashi108@gmail.com T.K.P.Rajagopal Associate Professor

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Provider-based deterministic packet marking against distributed DoS attacks

Provider-based deterministic packet marking against distributed DoS attacks Journal of Network and Computer Applications 3 (27) 858 876 www.elsevier.com/locate/jnca Provider-based deterministic packet marking against distributed DoS attacks Vasilios A. Siris,, Ilias Stavrakis

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

A Measurement Framework for Pin-Pointing Routing Changes

A Measurement Framework for Pin-Pointing Routing Changes A Measurement Framework for Pin-Pointing Routing Changes Renata Teixeira Univ. Calif. San Diego La Jolla, CA teixeira@cs.ucs.eu Jennifer Rexfor AT&T Labs Research Florham Park, NJ jrex@research.att.com

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico i Torino Porto Institutional Repository [Proceeing] Automatic March tests generation for multi-port SRAMs Original Citation: Benso A., Bosio A., i Carlo S., i Natale G., Prinetto P. (26). Automatic

More information

Prof. N. P. Karlekar Project Guide Dept. computer Sinhgad Institute of Technology

Prof. N. P. Karlekar Project Guide Dept. computer Sinhgad Institute of Technology Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Advance Deterministic

More information

One-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks

One-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong One-to-Many Multicast Restoration Base on Dynamic Core-Base Selection Algorithm

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

Adjacency Matrix Based Full-Text Indexing Models

Adjacency Matrix Based Full-Text Indexing Models 1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 360 A Review: Denial of Service and Distributed Denial of Service attack Sandeep Kaur Department of Computer

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

On the State of the Inter-domain and Intra-domain Routing Security

On the State of the Inter-domain and Intra-domain Routing Security On the State of the Inter-domain and Intra-domain Routing Security Mingwei Zhang April 19, 2016 Mingwei Zhang Internet Routing Security 1 / 54 Section Internet Routing Security Background Internet Routing

More information

Unicast Reverse Path Forwarding Loose Mode

Unicast Reverse Path Forwarding Loose Mode The feature creates a new option for Unicast Reverse Path Forwarding (Unicast RPF), providing a scalable anti-spoofing mechanism suitable for use in multihome network scenarios. This mechanism is especially

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

Multicast Routing : Computer Networking. Example Applications. Overview

Multicast Routing : Computer Networking. Example Applications. Overview Multicast outing 5-744: Computer Networking Unicast: one source to one estination Multicast: one source to many estinations Two main functions: Efficient ata istribution Logical naming of a group L-0 Multicast

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

IP Spoof Prevented Technique to Prevent IP Spoofed Attack

IP Spoof Prevented Technique to Prevent IP Spoofed Attack Available ONLINE www.visualsoftindia.com/vsrd/vsrdindex.html VSRD-TNTJ, Vol. I (3), 2010, 173-177 S H O R T C O M M U N I C A T I O N IP Spoof Prevented Technique to Prevent IP Spoofed Attack 1 Rajiv Ranjan*,

More information

Detecting IP Spoofing by Modelling History of IP Address Entry Points

Detecting IP Spoofing by Modelling History of IP Address Entry Points Detecting IP Spoofing by Modelling History of IP Address Entry Points Michal Kováčik 1,MichalKajan 1,andMartinŽádník2 1 IT4Innovations Centre of Excellence Faculty of Information Technology Brno University

More information

Aparna Rani Dept. of Computer Network Engineering Poojya Doddappa Appa College of Engineering Kalaburagi, Karnataka, India

Aparna Rani Dept. of Computer Network Engineering Poojya Doddappa Appa College of Engineering Kalaburagi, Karnataka, India Capturing the Origins of IP Spoofers Using Passive IP Traceback Aparna Rani Dept. of Computer Network Engineering Poojya Doddappa Appa College of Engineering Kalaburagi, Karnataka, India aparna.goura@gmail.com

More information

Content-Centric Networking Using Anonymous Datagrams

Content-Centric Networking Using Anonymous Datagrams Content-Centric Networking Using Anonymous Datagrams J.J. Garcia-Luna-Aceves 1,2 and Maziar Mirzazad Barijough 2 1 Palo Alto Research Center, Palo Alto, CA 94304 2 Department of Computer Engineering, University

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS

TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS Mohammed Alenezi 1 and Martin J Reed 2 1 School of Computer Science and Electronic Engineering, University of Essex, UK mnmale@essex.ac.uk 2 School of Computer

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Chapter 9 Memory Management

Chapter 9 Memory Management Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory

More information

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

How to Make E-cash with Non-Repudiation and Anonymity

How to Make E-cash with Non-Repudiation and Anonymity How to Make E-cash with Non-Repuiation an Anonymity Ronggong Song an Larry Korba Institute for Information Technology National Research Council of Canaa Ottawa, Ontario K1A 0R6, Canaa {Ronggong.Song, Larry.Korba}@nrc.ca

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

Securing BGP Networks using Consistent Check Algorithm

Securing BGP Networks using Consistent Check Algorithm Securing BGP Networks using Consistent Check Algorithm C. K. Man, K.Y. Wong, and K. H. Yeung Abstract The Border Gateway Protocol (BGP) is the critical routing protocol in the Internet infrastructure.

More information

NAND flash memory is widely used as a storage

NAND flash memory is widely used as a storage 1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage

More information

UC Santa Cruz UC Santa Cruz Previously Published Works

UC Santa Cruz UC Santa Cruz Previously Published Works UC Santa Cruz UC Santa Cruz Previously Published Works Title Efficient Multi-Source Multicasting in Information Centric Networks Permalink https://escholarship.org/uc/item/7mx2w441 Author Garcia-Luna-Aceves,

More information

Your projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /30 * 100

Your projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /30 * 100 You should worry if you are below this point Your projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /0 * 100 o Optimistic: (Your

More information

Design and Simulation Implementation of an Improved PPM Approach

Design and Simulation Implementation of an Improved PPM Approach I.J. Wireless and Microwave Technologies, 2012, 6, 1-9 Published Online December 2012 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijwmt.2012.06.01 Available online at http://www.mecs-press.net/ijwmt

More information

DDoS Attacks Detection Using GA based Optimized Traffic Matrix

DDoS Attacks Detection Using GA based Optimized Traffic Matrix 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing DDoS Attacks Detection Using GA based Optimized Traffic Matrix Je Hak Lee yitsup2u@gmail.com Dong

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:

More information

IP Traceback Based on Chinese Remainder Theorem

IP Traceback Based on Chinese Remainder Theorem IP Traceback Based on Chinese Remainder Theorem LIH-CHYAU WUU a, CHI-HSIANG HUNG b AND JYUN-YAN YANG a a Department of Computer Science and Information Engineering National Yunlin University of Science

More information

PART 2. Organization Of An Operating System

PART 2. Organization Of An Operating System PART 2 Organization Of An Operating System CS 503 - PART 2 1 2010 Services An OS Supplies Support for concurrent execution Facilities for process synchronization Inter-process communication mechanisms

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model TCP Symbiosis: Congestion Control Mechanisms of TCP base on Lotka-Volterra Competition Moel Go Hasegawa Cybermeia Center Osaka University 1-3, Machikaneyama-cho, Toyonaka, Osaka 56-43, JAPAN Email: hasegawa@cmc.osaka-u.ac.jp

More information

A Survey on Different IP Traceback Techniques for finding The Location of Spoofers Amruta Kokate, Prof.Pramod Patil

A Survey on Different IP Traceback Techniques for finding The Location of Spoofers Amruta Kokate, Prof.Pramod Patil www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 4 Issue 12 Dec 2015, Page No. 15132-15135 A Survey on Different IP Traceback Techniques for finding The Location

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost Secure Network Coing for Distribute Secret Sharing with Low Communication Cost Nihar B. Shah, K. V. Rashmi an Kannan Ramchanran, Fellow, IEEE Abstract Shamir s (n,k) threshol secret sharing is an important

More information

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy Email: hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico

More information

Efficient Recovery from False State in Distributed Routing Algorithms

Efficient Recovery from False State in Distributed Routing Algorithms Efficient Recovery from False State in Distribute Routing Algorithms Daniel Gyllstrom, Suarshan Vasuevan, Jim Kurose, Gerome Milau Department of Computer Science University of Massachusetts Amherst {pg,

More information

Comprehensive Solution for Anomaly-free BGP

Comprehensive Solution for Anomaly-free BGP Comprehensive Solution for Anomaly-free BGP Ravi Musunuri, Jorge A. Cobb Department of Computer Science, The University of Texas at Dallas, Richardson, TX-7083-0688 musunuri, cobb @utdallas.edu Abstract.

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average

Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average Tae Hwan Kim 1, Dong Seong Kim 2, Sang Min Lee 1, and Jong Sou Park 1 1 Dept. of Computer Engineering, Korea Aerospace

More information

Analysis. Group 5 Mohammad Ahmad Ryadh Almuaili

Analysis. Group 5 Mohammad Ahmad Ryadh Almuaili Analysis Group 5 Mohammad Ahmad Ryadh Almuaili Outline Introduction Previous Work Approaches Design & Implementation Results Conclusion References WHAT IS DDoS? DDoS: Distributed denial of service attack

More information

A Hybrid Routing Algorithm for Delay Tolerant Networks

A Hybrid Routing Algorithm for Delay Tolerant Networks Sensors & Transucers 2013 by IFSA http://www.sensorsportal.com A Hybri Routing Algorithm for Delay Tolerant Networs Jianbo LI, Jixing XU, Lei YOU, Chenqu DAI, Jieheng WU Information Engineering College

More information

Overview. Operating Systems I. Simple Memory Management. Simple Memory Management. Multiprocessing w/fixed Partitions.

Overview. Operating Systems I. Simple Memory Management. Simple Memory Management. Multiprocessing w/fixed Partitions. Overview Operating Systems I Management Provie Services processes files Manage Devices processor memory isk Simple Management One process in memory, using it all each program nees I/O rivers until 96 I/O

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet

A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C. Fernandes, and Otto Carlos M. B. Duarte Universidade Federal

More information