A Precise and Practical IP Traceback Technique Based on Packet Marking and Logging *

Similar documents
A New Path for Reconstruction Based on Packet Logging & Marking Scheme

Single Packet IP Traceback in AS-level Partial Deployment Scenario

A NEW IP TRACEBACK SCHEME TO AVOID LAUNCH ATTACKS

DoS Attacks. Network Traceback. The Ultimate Goal. The Ultimate Goal. Overview of Traceback Ideas. Easy to launch. Hard to trace.

A hybrid IP Trace Back Scheme Using Integrate Packet logging with hash Table under Fixed Storage

Prof. N. P. Karlekar Project Guide Dept. computer Sinhgad Institute of Technology

A Survey on Different IP Traceback Techniques for finding The Location of Spoofers Amruta Kokate, Prof.Pramod Patil

TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS

IP Traceback Based on Chinese Remainder Theorem

A New Logging-based IP Traceback Approach using Data Mining Techniques

An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network

Multivariate Correlation Analysis based detection of DOS with Tracebacking

IP traceback through (authenticated) deterministic flow marking: an empirical evaluation

A Network Coding Approach to IP Traceback

STF-DM: A Sparsely Tagged Fragmentation with Dynamic Marking an IP Traceback Approach. Online Publication

Bloom Filters. References:

A Probabilistic Packet Marking scheme with LT Code for IP Traceback

Novel Hybrid Schemes Employing Packet Marking and Logging for IP Traceback. Basheer Al-Duwairi, Member, IEEE, and G. Manimaran, Member, IEEE

Single Packet ICMP Traceback Technique using Router Interface

Survey of Several IP Traceback Mechanisms and Path Reconstruction

SIMULATION OF THE COMBINED METHOD

Scalable Hash-based IP Traceback using Rate-limited Probabilistic Packet Marking

TOPO: A Topology-aware Single Packet Attack Traceback Scheme

Comparative Study of IP Trace back Techniques

Distributed Denial-of-Service Attack Prevention using Route-Based Distributed Packet Filtering. Heejo Lee

Spoofer Location Detection Using Passive Ip Trace back

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric

Aparna Rani Dept. of Computer Network Engineering Poojya Doddappa Appa College of Engineering Kalaburagi, Karnataka, India

A Novel Packet Marking Scheme for IP Traceback

Design and Simulation Implementation of an Improved PPM Approach

A Flow-Based Traceback Scheme on an AS-Level Overlay Network

A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet

(Submit to Bright Internet Global Summit - BIGS)

Experience with SPM in IPv6

An Efficient and Practical Defense Method Against DDoS Attack at the Source-End

An Efficient Probabilistic Packet Marking Scheme for IP Traceback

Enhancing the Reliability and Accuracy of Passive IP Traceback using Completion Condition

Markov Chain Modeling of the Probabilistic Packet Marking Algorithm

IP TRACEBACK Scenarios. By Tenali. Naga Mani & Jyosyula. Bala Savitha CSE Gudlavalleru Engineering College. GJCST-E Classification : C.2.

A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing

An IP Traceback using Packet Logging & Marking Schemes for Path Reconstruction

A Lightweight IP Traceback Mechanism on IPv6

Geographical Division Traceback for Distributed Denial of Service

Enhancing Probabilistic Packet Marking by Integrating Dynamic Probability and Time to Live (TTL) Clustering

On IPv6 Traceback. obaidgnetworking.khu.ac.kr,cshonggkhu.ac.kr. highlights the related works; Section 3 will give an overview

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

POSSIBLE INTRUSIONS IP TRACE-BACK IN CLOUD COMPUTING ENVIRONMENT

Flooding Attacks by Exploiting Persistent Forwarding Loops

ABSTRACT. A network is an architecture with a lot of scope for attacks. The rise in attacks has been

RETRIEVAL OF DATA IN DDoS ATTACKS BY TRACKING ATTACKERS USING NODE OPTIMIZATION TECHNIQUE

An Investigation about the Simulation of IP Traceback and Various IP Traceback Strategies

Analyze and Determine the IP Spoofing Attacks Using Stackpath Identification Marking and Filtering Mechanism

A Four-Step Technique for Tackling DDoS Attacks

Identifying Spoofed Packets Origin using Hop Count Filtering and Defence Mechanisms against Spoofing Attacks

Research Article Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy

Provider-based deterministic packet marking against distributed DoS attacks

MITIGATION OF DENIAL OF SERVICE ATTACK USING ICMP BASED IP TRACKBACK. J. Gautam, M. Kasi Nivetha, S. Anitha Sri and P. Madasamy

Evaluation of Path Recording Techniques in Secure MANET

DDOS Attack Prevention Technique in Cloud

Detection of Spoofing Attacks Using Intrusive Filters For DDoS

NOWADAYS, more and more critical infrastructures are

A Secure Method to Deliver Access Tokens to End Hosts

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

A Method of Identifying the P2P File Sharing

IP Spoof Prevented Technique to Prevent IP Spoofed Attack

StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense

The Systematic Survey for IP Traceback Methods

A General Model of Probabilistic Packet Marking for IP Traceback

Error Detection and Correction by using Bloom Filters R. Prem Kumar, Smt. V. Annapurna

Xiang, Yang and Zhou, Wanlei 2005, Mark-aided distributed filtering by using neural network for DDoS defense, in GLOBECOM '05 : IEEE Global

An Enhanced Bloom Filter for Longest Prefix Matching

IP Traceback Using DNS Logs against Bots

Shim6: Reference Implementation and Optimization

Multi Directional Geographical Traceback with n Directions Generalization

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks

Hash-Based IP Traceback

MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN

IPv4 to IPv6 Network Migration and Coexistence

Inter-domain routing validator based spoofing defence system

A Novel Approach to Denial-of-Service Attack Detection with Tracebacking

Advanced and Authenticated Marking Schemes for IP Traceback

Thwarting Traceback Attack on Freenet

DENIAL OF SERVICE ATTACKS: PATH RECONSTRUCTION FOR IP TRACEBACK USING ADJUSTED PROBABILISTIC PACKET MARKING. A Thesis RAGHAV DUBE

Internet level Traceback System for Identifying the Locations of IP Spoofers from Path Backscatter

Tree-Based Minimization of TCAM Entries for Packet Classification

Your projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /30 * 100

Forensic Analysis for Epidemic Attacks in Federated Networks

Increasing the effectiveness of packet marking schemes using wrap-around counting Bloom filter

Foundations of Network and Computer Security

A Study on Intrusion Detection Techniques in a TCP/IP Environment

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks

Denial of Service, Traceback and Anonymity

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30

ABSTRACT. in defeating Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks.

Packet track and traceback mechanism against denial of service attacks

Chapter 2 PROTOCOL ARCHITECTURE

AN UNIQUE SCHEME FOR DETECTING IP SPOOFERS USING PASSIVE IP TRACEBACK

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering

Transcription:

JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 28, 453-470 (2012) A Precise and Practical IP Traceback Technique Based on Packet Marking and Logging * State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing, 100876 P.R. China Tracing malicious packets back to their source is important to defend the Internet against Denial of Service (DoS) intrusion. IP traceback is just the technique to realize the goal, it reconstructs IP packets traversed path in the Internet to determine their origins. There are two major kinds of IP traceback techniques, which have been proposed as packet marking and packet logging. In packet marking, it incurs little overhead, but requires a large number of packets to get the complete path. In packet logging, it requires plenty of storage space to record packet digests information, but has the capability to trace even a single packet. Therefore, it is a new idea to draw on both advantages to get the intrusion source. HIT (Hybrid IP Traceback) is a representative hybrid IP traceback approach, but it has some vulnerabilities. It may return incorrect path in the traceback process, and its storage overhead remains high. In this paper, we propose a precise IP traceback approach with low storage overhead, which improves accuracy and practicality greatly. In the end, the feasibility and effectiveness are evaluated by mathematical analysis and simulations. Keywords: cyber security, IP traceback, denial of service (DoS) intrusion, packet marking, packet logging, hybrid IP traceback 1. INTRODUCTION In current cyber intrusion, Denial of Service and some subsequent forms become one of the most threatening types. It was reported that (D)DoS traffic in the Internet increase a number of times in eight years from a few hundreds of Mega-bytes in 2002 to 100 Giga-bytes in 2010, in 2010 Worldwide Infrastructure Security Report [1], from Arbor Networks. Several famous Internet corporations, including Yahoo, Amazon and CNN were brought down for hours [2]. In order to defend Internet against DoS intrusion, an effective way is to find the source and eliminate the attack taking place. Unfortunately, because of the anonymous access and non-state characteristics of Internet, there is no record about the transmission path of packets. Therefore, we cannot get the packet source straightforward from the source address of the packet reliably. IP traceback is just to resolve this problem, and many excellent approaches are proposed, such as Input Debugging [3], ICMP traceback [4], packet marking [5], packet logging [6] and entropy variations [7]. Each approach has its advantages to some certain conditions or some certain DoS forms. The most important techniques are: packet marking and packet logging. The main idea of packet marking is that routers write their ID information into some fields of IP header. When the victim host gets sufficient packets, it Received May 18, 2011; revised September 17 & November 21, 2011; accepted December 29, 2011. Communicated by Wanjiun Liao. * This work was supported by the Innovative Research Groups of the National Natural Science Foundation of China (61121061). 453

454 can reconstruct the full path. The most representative method is known as PPM (Probabilistic Packet marking) [8-12]. The main idea behind packet logging is that routers record the state information of their forwarding packets locally. When the victim node suffers from intrusion, it can query the log-tables recorded in the routers and makes matching with the attack packet. In the recursive process, we can obtain the complete path in the end. The most representative method is SPIE (Source Path Isolation Engine) [13, 14]. The two types have their own features: PPM incurs little overhead when routers mark packets in a low marking rate, but the victim needs a large number of packets to reconstruct the path to the source. It is more suitable for flooding DoS traceback, and does not have the capability to trace a single packet. While SPIE extracts the digests of packets and stores them in a space-efficient data structures known as bloom filter [15], which decreases the storage overhead and makes the packet logging scheme practical. It can trace small packets flows, even a single packet. However, it is still a challenging task for its practicality due to its remaining high storage overhead. Therefore, it is attractive to propose an effective IP traceback mechanism with the combination of the two traceback techniques, which is called a hybrid IP Traceback scheme. At present, HIT (Hybrid Internet Traceback) [16] proposed by Gong Chao is the most representative. HIT borrows the main idea of packet logging, and records packet digests in every other router. The marking routers do not record digests, but write their ID information into some certain fields of IP header. It is efficient to reduce the huge storage overhead of SPIE. However, there are some drawbacks of HIT. Firstly, it may return incorrect path even the false source; then it still has a great demand for storage, which would limits its practicality. In this paper, we present PPIT, a precise and practical IP traceback approach, based on both packet marking and packet logging. The main idea of our approach is to add some path authentication to the packet digest, which can eliminate the incorrect path; and make full use of the marking space in a more efficient mode, which can store more value to reduce storage overhead further. All of these efforts can make hybrid IP traceback technique more practical. We evaluate the feasibility and effectiveness of our mechanism by comparing it to HIT. The rest of this paper is organized as follows: Section 2 presents the background information and related work. Section 3 describes PPIT scheme in detail. Section 4 evaluates the performance of our approach through mathematical analysis and simulation. Section 5 has a discussion on the issues of deployment, security and implementation. Finally, section 6 summarizes the paper. 2.1 Background 2. BACKGROUND AND RELATED WORKS Denial of Service (DoS) is a threatening intrusion in the Internet now. According to the size of attack packet flow, it can be classified to two groups. One type is to consume the resource of the victim with a huge number of meaningless packets, which can be named as resource consuming DoS. It is the major type, and can make the victim resource exhaustive in a very short time. The other type is to make the victim cannot pro-

A PRECISE AND PRACTICAL TECHNIQUE FOR IP TRACEBACK 455 vide service with the vulnerability of the software or service running on the victim, which named software exploit DoS. The key feature of it is the smaller packet flows, even a single packet. It has become an important part of DoS in recent years. What we should do is try our best to defend the serious cyber attack. Unfortunately, IP network is designed for freedom and resource share without much consideration of security issues, and anonymous access and non-state are two key characteristics. It means no guarantee for the authenticity of the source address, and no record about the transmission path of packets. In addition, attacker may insert an arbitrary address into the source address field of a packet, which is known as IP spoof, and IP spoof makes it more difficult to defend DoS intrusion. Therefore, it is an extraordinary challenge for us to trace back to the source of DoS. IP Traceback technique is studied to resolve the problem, and it can be defined that equipments in IP network record packets state information in the network with a certain mechanism, reconstruct the complete path and find the source reliably in the end. The goal of IP traceback is to find the attack path from the victim to the attacker. We consider a good IP traceback approach should have the following features: 1. Precision: It is the most important feature otherwise it is meaningless for us to conduct IP traceback. 2. Low overhead: This feature makes the approach practical when commit IP traceback in the network. 3. Ability to trace a single packet: This feature means the approach can trace not only the resource consuming DoS, but also the software exploits DoS. 2.2 Packet Logging Scheme Sager [6] introduced an idea to record packet state information in a router log, so as to reconstruct the attack path and get the attack source. This method can trace not only the flooding attack with a large number of packets, but also the single packet attack. It was thought to be impractical for its huge storage requirement. In order to reduce the storage overhead of log-based technology, log information needs a space-efficient manner. SPIE is proposed with the packet logging idea, so it has the ability to trace a single packet. In SPIE, routers do not store the whole packet, but the digest with bloom filter, which is famous for its space-efficiency. In this way, the condition of storage requirement has been greatly improved (down to 0.5% of the total link capacity per unit time) [13]. 2.3 Packet Marking Scheme Unlike packet logging scheme, in packet marking scheme, routers do not record packets digests, but write their ID information into IP header. When the victim gets sufficient packets, it can reconstruct the full attack path. Savage et al. [8] proposed the classic probabilistic packet marking (PPM) method. PPM makes use of the Identification field as the marking space and stores the link information. It divides the IP address into eight fragments, 4 bits for each. This IP address fragment and the same offset fragment of the next router compose the edge fragment with 8 bits. The offset flag needs 3 bits for

456 eight fragments, and the last 5 bits are enough to show the hop number. It is reported that few packets exceed 25 hops in the forwarding network [8]. When a router decides to mark a packet, it chooses a random fragment of its IP address, and records the fragment offset with the distance field set to 0. The advantage of PPM is that it needs no storage overhead for each router. But the drawbacks are also apparent. Victim needs a large number of packets to reconstruct the attack path, and PPM does not have the ability to trace a single packet. 2.4 Motivations They are two representative IP traceback approaches shown above, and they have their own distinct characteristics. The hybrid IP traceback scheme should conduct traceback in a more reasonable way, which has the features of both types, and it is the goal to many researchers. HIT is a representative hybrid approach, which has a better performance for traceback. However, it has some serious vulnerable points. Firstly, it improves the storage overhead for packet logging, but neglects the accuracy of path reconstruction, which may lead to the failure of traceback. Then, it uses some fields of IP header for packet marking, but only in an inefficient way. In this paper, we will present a precise hybrid IP traceback approach with economical storage overhead. In this way, the hybrid IP traceback approach can be more practical and competent. 3. PRECISE AND PRACTICAL IP TRACEBACK APPROACH 3.1 Main Idea Packet logging scheme makes routers record the state information of packets, and it has the capability to trace a single packet. Therefore it can provide the straightforward evidence for traceback. It becomes practical when SPIE appeared, but it still needs great storage space. Packet marking approach makes routers write ID information into packet IP header, and reconstruct the complete path in the victim node. It does not increase storage burden on routers. Several researchers combine the features of the two approaches to propose hybrid IP traceback approaches [16-18]. The approaches are outstanding for their low storage overhead, and single packet traceback capability. In hybrid IP traceback, each traceback-enabled router will conduct logging or marking. However, hybrid IP traceback approaches should not be the simple combination of the two methods, and we must pay much attention to some key issues. Firstly, in normal condition, a marking router has no more than one neighboring logging router, which logged the attack packet. However, in some certain situations, packets will follow some special routes, and a marking router may have more neighboring logging routers. HIT may return false paths, which could lead to the failure of traceback. Secondly, in the marking process, marking routers insert ID into IP header without logging, which can reduce storage overhead. The marking space in IP header is limited, and full utilization of the space can hold more ID information, which can reduce the percentage of logging routers in all traceback routers. In this way, the IP traceback approach is more practical.

A PRECISE AND PRACTICAL TECHNIQUE FOR IP TRACEBACK 457 3.2 Router Operation PPIT is based on IPv4. It is different for PPIT to implement under IPv6 from IPv4, which will involve adding an extension header in IPv6 packets. The IPv6 implementation of PPIT needs more research because IPv6 has built-in security mechanisms such as authentication headers to provide origin authentication. Therefore, we leave it as our future work. PPIT is a hybrid IP traceback approach, has the capability to conduct marking, and stores the messages in IP header. This message can show the state information instead of logging in the router, which can reduce the storage overhead. Like packet marking approaches, PPIT make use of some fields in the IP header when conduct marking. The utilization of IP header for marking in PPIT is shown in Fig. 1. Fig. 1. The utilization of IP header for marking in PPIT. Three fields in IP header are used for marking: they are Identification, Reserved flag and fragment offset. Similar to other PPM, PPIT reuses the Identification field, which is for IP fragmentation. Measurement studies show that less than 0.25% of packets are fragmented in the Internet [19]. Savage et al. [8] had some discussion about the backward compatibility issues of utilization of this field and confirmed its utilization. PPIT reuses Reserved Flag (RF) field for marking as suggested in [20]. The fragment offset field will become meaningless if the IP Identification filed is reused for other purposes. Therefore, some traceback approaches utilize this field [21, 22], PPIT follows this way. Someone may argue that the value in the fragment offset field could cause some compatible problems. In order to avoid such issues in PPIT, the marking information will be removed before the packet arrives at the destination. In a certain area, IP address is too long to be taken in the IP header marking space and is unnecessary. In PPIT, each marking router is assigned a 14-bit ID number, which is to differentiate it to other neighboring routers. Muthuprasanna et al. [23] studied the unique ID number assignment problem for Internet routers and proposed an approach for internet coloring. They report that 14 bits are enough for a unique ID number assignment within a three-hop neighborhood and 12 bits for two-hop neighborhood, based on the

458 analysis of several Internet topology data sets. Furthermore, the same ID number can be assigned to routers more than one in different three-hop neighborhood, if these neighborhoods do not have a common router. Therefore, we can use such short ID information to replace IP address. PPIT makes use of the Identification field to store routers ID in 14 bits, which is called router ID field. The ID is generated for each traceback-enabled router, which is set by the network administrators. PPIT makes an efficient utilization of IP header, which stores more information. In order to trace a single packet, PPIT records packet state information in local routers after two marking times. It computes packet digests in the similar way as HIT. A router uses some fields of IP packet prefix as the input parameter for the digest functions. In PPIT, the packet prefix chosen is IP header (exclude TOS and checksum) with 8-byte of the payload, while HIT does not choose TTL as a part of digest parameter. The digest section of PPIT is shown in Fig. 2. Fig. 2. PPIT Digest section (shaded fields excluded). Fig. 3. The process of a Bloom Filter with k hash functions. PPIT stores packet digests in digest tables that are implemented with Bloom Filter, which is famous for its space efficiency. A bloom filter computes k distinct packet digests for each packet using independent hash functions, and uses the n-bit result to index into a 2 n -bit array. The array is initialized to all zero, and then the corresponding bits are changed to 1 after packets hash calculations. The process of a Bloom Filter with k hash functions is shown in Fig. 3. For a traceback-enabled router, whether to do marking or do logging is determined by the value in the hop count. When the value is 0 or 1, the router does marking for the packet, and then makes the value increased by 1; when the value is 2, the router does logging for the packet, and then changes the value to 0.

A PRECISE AND PRACTICAL TECHNIQUE FOR IP TRACEBACK 459 3.3 Designs for Precision It is the goal for IP traceback to reconstruct the attack path precisely, and find the attacker to eliminate the intrusion taking place. Therefore, precision is the key factor to the success of IP traceback. However, some approaches ignore the importance of accuracy of path reconstruction. A mature hybrid IP traceback approach HIT also has the vulnerability of incorrect path reconstruction. It shows the condition in Fig. 4. Fig. 4. An example of incorrect path reconstructed by HIT. The main idea of HIT is to record packet digests in every other router. In this way, it can do two-hop search in the traceback process. However, in the procedure of reconstruction, errors may occur like Fig. 1. Solid lines represent the links connecting nodes in the real network topology. The arrows represent the path traversed by attack packet. The dotted lines represent the path returned by IP traceback approach. From the figure, the real attack path is R1, R3, R7, R6, R5, R9, and R10. We suppose that the logging routers are R1, R7, R5 and R10, and other ones write ID into packets IP header. In the traceback process, HIT finds R10, which connects to victim node directly. The ID information of R9 is kept in the packet header, and recorded in R10 as a part of the digest. Therefore, we can find R9 directly from the digests kept in R10. When HIT does traceback further, it needs to send query requests to the neighbors of R9. Unfortunately, the arrival of responses to the requests is random. As shown in Fig. 1, R5 and R7 are both neighbors of R9, they record the attack packet digests both. It is possible for R7 to return response first. In this condition, R7 would be added in the attack path as the upstream router of R9. Then we can get R3, which is the upstream router of R7. After response to the query request, R7 eliminates the digest record. By now, the incorrect paths have not been considered serious, and the returned path is indeed close to the attack source. However, further traceback may bring new errors. Then, it sends query requests to the neighbors of R3. Like the condition shown above, it is possible that R5 return re-

460 sponse first. HIT would add R5 to the attack path as the upstream router of R3, and its upstream one is R6. When it sends query requests to the neighbors of R6, no responses return. (Routers will erase its records after response.) In this condition, HIT finishes the attack path reconstruction, and makes R6 to be the router connected to the attack node. It is a serious error, which leads to the failure of IP traceback. To avoid the occurrence of errors like this, it is necessary to introduce some path authentication mechanisms. We present a mechanism to achieve the goal with the help of the TTL field of IP header. TTL will change when packets traverse in the network, which makes it not convenient for digests matching. Therefore, it is not chosen to be a part of the digest in HIT. However, it can show the order of forwarding path. PPIT is a hybrid IP traceback approach. Routers do marking or logging alternatively in a certain manner. Similar to SPIE, PPIT stores packet digests in digest tables that are implemented with Bloom Filter. TTL field is a part of digest in PPIT. From the feature of Bloom Filter, it makes no increment in storage overhead with the participation of TTL field. However, we must think of its variability when the packets traverse the network. In the traceback process, PPIT increases TTL by one in each traceback hop, and inserts the new value into TTL field. Then PPIT conducts the same hash calculation of the attack packet with the hash table, and makes matching. When PPIT faces the condition as Fig. 1, if the attacker uses Red Hat, the default TTL value of packet p is 64. After forwarded by the 7 routers, the TTL value of p is 57. When tracing to R9, the TTL value is 59, the next traceback TTL value is 60, which can match the digest recorded in R5. However, it cannot match the digests in R7, because TTL value of the digests here are 62. Therefore, PPIT can avoid the incorrect path in the traceback process like HIT, and it can be more precise than HIT. 3.4 Designs for Decreasing Storage Overhead Further PPIT improves the efficiency of the marking space utilization, which leads to the storage overhead reduction. In order to make it robust, PPIT changes the ID value assigned to routers in a certain time interval. Because of the three-hop neighborhood router ID marking scheme used in PPIT, it has the capability to record the digests of the packets every three hops. The marking and logging mechanism is shown in Fig. 5. Fig. 5. Packet marking and logging of PPIT. When a packet is forwarded in the direction as the array showing in Fig. 5, R1 records its digests and sets its hop count to 0. Then the packet comes to R2, R2 writes its ID information into the router ID (R_ID) field and the last marking router ID (LR_ID) filed of the marking space, and sets the hop count to 1. Then the packet comes to R3, R3

A PRECISE AND PRACTICAL TECHNIQUE FOR IP TRACEBACK 461 finds the hop count is 1, it XORs (exclusive-or) its ID information with the value stored in R_ID field, rewrites this field with the new value, overwrites LR_ID field with its ID, and set hop count to 2. When the packet comes to R4, R4 notices the hop count is 2, then it records the packet digest into digest table according to the certain LR_ID value with time stamp, and records the information stored in R_ID field in a new table named two-hop ID information table in the same mode. And at last, R4 forwards the packet to the next router and set hop count to 0. The two-hop ID information table is also stored according to the certain LR_ID value with the time stamp corresponding with the digest table. The length of a table item is 14 bits, and the degree of a router in the network is limited, the average value is 6.29 [24]. According to this, the average item number is 6.29. Therefore, the storage cost is countable and acceptable. When a packet comes with the hop count value to be logged, which means the value is 2. The router will query the two-hop ID information table to check if the information in the router ID field has been stored locally. If no matching exists, PPIT will add the information to the first item of the table. If exist matching, PPIT will adjust the item to the first one. According to the theory of the Matthew Effect [25], packets are more likely to choose the better path on their transmission. Therefore, the adjustment of the table is meaningful. The upper items are more likely to be the path messages of the packets, although it is not accuracy. The worst case is to search the whole table. IP packets may undergo a valid transformation, such as fragmentation and tunneling, when traversing the network. In order to trace a single packet, PPIT has the capability to handle transformed packets in a similar way as SPIE. If a packet is undergoing transformation or IP fragment in a traceback-enabled router, it should be logged whether its turn to be logged or not. In this condition, the router will log the new digest together with the old one in a new table called transformed table in the same form shown above. With the correspondence between the two, we can trace to the upstream routers across the transformed node. These tables are recorded in the routes locally in the same form of SPIE, which use Bloom Filter. 3.5 Traceback When the victim node is under invasion, it needs to reconstruct the attack path to find the source and stop the attack. As shown in Fig. 6, R1, R6 and R10 are logging routers to record packet digests, others are marking routers. In the traceback process, R10 is the starting router to conduct traceback, which connects to the victim node directly. The hop count in the attack packet is 0, PPIT writes the items of the two-hop ID information table into the packet router ID field in turn, inserts the relative last marking router ID into the LR_ID field, and inserts the proper TTL value into the field as shown in 3.1. Then extracts the digests and does the same hash operation as the digest table. Finally, it makes matching with the records in digest table according to the same LR_ID value and time interval. If matching, we can consider the packet was forwarded by the router with the determinate upstream router. Then it will XORs the value with the value in R_ID field. Therefore, we can make sure that R5 is on the attack path. It is the furthest router in one traceback attempt. The next step is to send the query requests to all neighboring routers, including R3, R4 and R6. When a router receives a query request, the router examines all digest tables

462 Fig. 6. Packet transmission path reconstruction. in the relevant time interval to make matching. With the help of TTL, routers cannot return wrong paths. Therefore, R6 can be found as the upstream router of R5. In the recursive way, upon the responses from the queried routers, the complete path can be reconstructed, and the attack router can be identified in the end. 4. PERFORMANCE EVALUATION We evaluate PPIT in mathematical analysis and simulation by comparing it to HIT. 4.1 Traceback Accuracy Traceback accuracy is an important specification for IP traceback approaches. We may get incorrect path or even failure of IP traceback without great traceback accuracy. Therefore, we should pay more attention to the issue. Some accuracy issues are inherent in some certain processes, such as the process of packet digests record at logging routers with bloom filter. We cannot eliminate the false positive here, what can we do is to choose some appropriate value for the parameters to control the false-positive rate. Other accuracy issues are from the IP tracaback scheme Vulnerability. They are design flaws, and if we can check and improve our IP traceback mechanism carefully, we can eliminate them. As shown above, the hybrid IP traceback also have accuracy issues. 1. False positive of bloom filter Bloom Filter is a space-efficient data structure, which is used for packets logging. It computes k distinct packet digests for each packet using independent uniform hash functions. The effective false-positive rate for a Bloom filter that uses k digest functions to store n packets in m bits of memory can be expressed as

A PRECISE AND PRACTICAL TECHNIQUE FOR IP TRACEBACK 463 1 / (1 (1 ) kn ) k P = (1 e kn m ) k. (1) m We can get from Eq. (1), n/m is called memory efficiency factor [13], and the falsepositive rate of a bloom filter can be controlled by choosing hash functions and memory efficiency factor carefully. PPIT and HIT both use bloom filter to implement digest tables. Though PPIT has digests with TTL filed, the bloom filter computes k distinct value to writer into the digest table without false-positive rate increment. 2. IP traceback scheme vulnerability This type of accuracy issue is from IP traceback mechanism design, as shown in section 3.2. HIT neglects the serious precision problem, which may lead to failure of IP tracebcak. In PPIT, the logging routers record the TTL-added digests of a packet, which can avoid incorrect path in the traceback process, but introduce no false positive increment. 4.2 Storage Overhead The hybrid IP traceback approaches have the same capability as SPIE, to trace a single packet and transformed packets. In order to evaluate the storage overhead, we will borrow the evaluating methods from HIT. In PPIT, routers will do packets logging in the conditions listed below: 1. IP fragments; 2. Nonfragmented packets need to be logged at the router. The second condition includes three scenarios. The first is that nonfragmented packets have not been logged in the two upstream routers. The second is that nonfragmented packets were logged at the directly upstream router but transformed at the current router. The last is that nonfragmented packets were logged in the upstream router two-hop away and were not logged at the direct upstream router, but transformed in the current router. In the similar way as HIT, we use P to denote the percentage of packets needed to be logged at the router, and assume the IP fragments percentage is a, the transformation percentage is b. We use Q to denote the percentage that need to be logged at the router without fragmentation. In this way, we can express the storage overhead with the percentage of packets that need to be logged. The percentage of different conditions that packets need to be logged is listed in Table 1. All possible scenarios that packets need to be logged are expressed in Table 1. The percentage of packets that need to be logged can reflect the storage overhead. Now we will have mathematics analysis to show the result. According to parameters listed above, we have: P = a + (1 a) Q. (2)

464 Table 1. Percentage of packets logged in different scenarios. Packets Logged Scenarios Percentage 1. IP fragments a 2. Nonfragmented packets need to be (1 a) Q logged at the router (includes 2.1, 2.2 & 2.3 below) 2.1. nonfragmented packets not logged (1 a) (1 Q) (1 Q) in the two upstream routers 2.2. nonfragmented packets logged at (1 a) Q b the direct upstream router but transformed at the current router 2.3. nonfragmented packets logged in (1 a) Q b the upstream router two-hop away and not logged at direct upstream router, but transformed in the current router Because the second condition includes three scenarios, thus we have: Q = (1 Q) 2 + Q b + Q (1 Q) b. (3) We can get the equations from Eq. (2): Q = (P a)/(1 a), (4) 1 Q = (1 P)/(1 a). (5) We use Eqs. (4) and (5) to substitute for Q and 1 Q in Eq. (3). The result is 1 b P + P P = 1 a 2 2 (1 ) (1 ) (1 ) 0, 2 (1 a)( 1 + 4(1 b) 1) P = 1. (7) 2 (1 b) (6) Some researchers studied the Internet, and show the measurement results that a 0.25 percent [26] and b 3 percent [27]. Thus, we can get the result 0.382 P 0.392. (8) The result shows that the percentage of packets which need to be logged is about 39 percent. And the result from HIT is about 50 percent. We can get the storage overhead comparison from the result. If we use TSC to express the Traceback Storage Cost, and TSC a to denote the storage cost of all packets to be logged. We can use TSC p and TSC h to denote TSC in PPIT and HIT. From the analysis above, we can get TSC p = P TSC a 2/3 TSC h. (9)

A PRECISE AND PRACTICAL TECHNIQUE FOR IP TRACEBACK 465 4.3 Simulations In this part, we conduct some simulations to supplement the analytic results. We focus on traceback accuracy and packts logging overhead. For traceback accuracy, we design simulations to study the number of incorrect path returned by HIT and PPIT. The simulation is based on the AT&T POP level topology collected by Rocketfuel [28], which include 10332 nodes. Fig. 7. False edges returned by HIT and PPIT. Fig. 7 shows the false edges on AT&T topology, returned by HIT and PPIT respectively. It can be seen that HIT returns attack graph with several false edges. Some of them may lead to failure of IP traceback. Meanwhile PPIT does not return any false edges in the traceback process with the help of our path validation mechanism. The occurrence of incorrect path is because some nodes in the attack path have more than one logging neighboring router. One router sends query requests to all its neighbors, and those logging routers may return response in a non-deterministic mode in HIT. The result demonstrates the advantage of PPIT in traceback accuracy. For packets logging overhead, we conduct simulations to check the logging probability of routers in HIT and PPIT. This can reflect the storage overhead in the network. We assume that an end host is connected directly to a router. The simulations are based on two network topologies: The first one is a synthetic topology, includes 1000 routers. The second topology is AT&T POP-level topology, which includes 10332 nodes, the same as we use above. We choose sending host and receiving host randomly, consider the largest hop number is 25. And we conduct 500000 packets forwarding to study the logging routers number of HIT and PPIT. Figs. 8 and 9 show the logging probability of routers in HIT and PPIT. In both figures, the horizontal axis stands for logging probability whose value is x, and the vertical axis stands for the percentage of routers, whose logging probability is lower than the value of x. From both figures, we can get the logging probability of HIT and PPIT. Because PPIT utilizes the marking space in a more efficient mode, it has a better performance in storage overhead. Packets can bring more information in PPIT, so the logging probability can be lower in PPIT than that in HIT. In Fig. 8, the connectivity between routers is uni-

466 form in synthetic topology, the logging probabilities fall in the range of 30 percent to 40 percent in PPIT, lower than the logging probability in HIT. In Fig. 9, the connectivity distribution is not uniform. The result demonstrates that nearly every router has a logging probability lower than 70 percent in PPIT, which does a better job than HIT. Logging Probability x Fig. 8. Synthetic topology logging probability experiment. Logging Probability x Fig. 9. AT&T topology logging probability experiment. 5.1 Deployment 5. DISCUSSION The packet logging traceback approach is capable to trace a single packet with the widespread deployment in the network. PPIT borrows some ideas from packet marking mechanism, and it improves the storage overhead greatly. The deployment of PPIT can be divided into two parts: The first one is marking mechanism, which can be implemented in the routers by protocol modification. The modification can make the routers have the capability to write ID information into the packet marking space when necessary. The second one is logging mechanism, which can be implemented in the routers, or in independent equipments called network tap. Sometimes, the router is not convenient to upgrade with our logging mechanism. Therefore, we can use network tap to do the logging task instead, which is connected to the router directly.

A PRECISE AND PRACTICAL TECHNIQUE FOR IP TRACEBACK 467 The router can be called traceback router, if it is implemented with marking mechanism or logging mechanism. PPIT can support incremental deployment in the network. All traceback routers can compose an overlay network. Every router in the overlay network can have the knowledge of its neighboring traceback routers. The traceback task is done among the traceback routers, and we can reconstruct attack path in the overlay network. The traceback will become more accurate with the increasing deployment of PPIT. 5.2 Security Routers store the state information of packets with a lot of payload in some logbased IP traceback approaches, from which attackers may want to eavesdrop to get some valuable information. The logging routers in PPIT only use very few packet payloads as a part of digest to store in bloom filter, which makes it impossible for attackers to eavesdrop. Attackers may want to mislead the IP traceback process by writing some forged marking value into packets. This may make the router to find an incorrect upstream path. However, it is not easy to exploit the vulnerability in PPIT. Firstly, attackers must get the knowledge of neighboring routers ID to write the false value. It is difficult in PPIT, because the ID is not public information like IP address, and the ID changes in a certain time interval. Then, packets are logged in every three traceback routers. The second marking router ID is kept in LR_ID field, which shows the direct upstream marking router of a logging router. It is not easy for an attacker to guess the ID assigned for one of the other neighboring marking routers. It seems more difficult to forge the first marking router ID. The logging router keeps the information of three-hop neighboring routers. Therefore, if the spoofed ID is not matching the topology relationship in the traceback overlay network, the router will drop it. The random ID number for the marking routers in PPIT can alleviate this problem to some extent. 5.3 Implementation Because of the characteristic of hybrid scheme, it should deploy both packet marking scheme and packet logging scheme in the router. When packets come to the router, it checks the hop count in IP header to decide to conduct marking or logging. While in the single scheme approaches, the routers can do a single traceback task without judging. However, the overhead is accountable. However, the routers in hybrid scheme can reduce plenty of storage overhead. Therefore, the tradeoff is reasonable and meaningful. 6. CONCLUSION HIT illustrates the feasible to trace a single packet in a hybrid traceback mechanism, which has the advantage of packet marking and packet logging schemes. However, the accuracy issues and inefficient utilization of the marking space are obvious defects of HIT. Accuracy issues in HIT can add some incorrect paths, and even make it fail to trace back to the source. Inefficient utilization of the marking space makes HIT still have high storage overhead.

468 In this paper, we have proposed a precise and practical IP traceback approach, which is called PPIT. The main idea of PPIT is to add some path authentication mechanism, which can avoid returning incorrect path in the traceback process; and make efficiently full utilization of limited marking space with more hops marking value inserted into the marking space, which can reduce the storage overhead in the logging routers. In the end, our approach is illustrated to be accurate and storage economical with mathematical analysis and simulations. ACKNOWLEDGMENT We would like to thank the anonymous reviewers for their insightful comments. REFERENCES 1. Arbor Networks Inc., 2010 worldwide infrastructure security report, [EB/OL], http: //www.arbornetworks.com/report. 2. L. Garber, Denial-of-service attacks rip the internet, IEEE Computer, Vol. 33, 2000, pp. 12-17. 3. R. Stone, CenterTrack: An IP overlay network for tracking DoS floods, in Proceedings of the 9th Usenix Security Symposium, 2000, pp. 199-212. 4. S. M. Bellovin, ICMP traceback messages, Network Working Group Internet Draft, March 2000. 5. H. Burch and B. Cheswick, Tracing anonymous packets to their approximate source, in Proceedings of the 14th USENIX Conference on System Administration, 2000, pp. 319-328. 6. G. Sager, Security fun with OCxmon and cflowd, Internet 2 Working Group Meeting, November 1998. 7. S. Yu, W. L. Zhou, and W. J. Jia, Traceback of DDoS attacks using entropy variations, IEEE Transactions on Parallel and Distributed Systems, Vol. 22, 2011, pp. 412-425. 8. S. Savage, D. Wetherall, A. Karlin, and T. Anderson, Network support for IP traceback, IEEE/ACM Transactions on Networking, Vol. 9, 2001, pp. 226-237. 9. D. X. Song and A. Perrig, Advanced and authenticated marking schemes for IP traceback, in Proceedings of the IEEE INFOCOM, 2001, pp. 878-886. 10. H. C. Tian, J. Bi, X. Jiang, and W. Zhang, A probabilistic marking scheme for fast traceback, in Proceedings of the 2nd International Conference on Evolving Internet, 2010, pp. 137-141. 11. P. Sattari, M. Gjoka, and A. Markopoulou, A network coding approach to IP traceback, in Proceedings of IEEE International Symposium on Network Coding, 2010, pp. 1-6. 12. A. Yaar, A. Perrig, and D. Song, FIT: Fast internet traceback, in Proceedings of IEEE INFOCOM, Vol. 2, 2005, pp. 1395-1406. 13. A. Snoeren, et al., Single-packet IP traceback, IEEE/ACM Transactions on Networking, Vol. 10, 2002, pp. 721-734. 14. L. A. Sanchez, et al., Hardware support for a hash-based IP traceback, in Pro-

A PRECISE AND PRACTICAL TECHNIQUE FOR IP TRACEBACK 469 ceedings of the 2nd DARPA Information Survivability Conference and Exposition, 2001, pp. 146-152. 15. B. Bloom, Space/time trade-offs in hash coding with allowable errors, Communications of ACM, Vol. 13, 1970, pp. 422-426. 16. C. Gong and K. Sarac, A more practical approach for single-packet IP traceback using packet logging and marking, IEEE Transactions on Parallel and Distributed Systems, Vol. 19, 2008, pp. 1310-1324. 17. S. Malliga and A. Tamilarasi, A hybrid scheme using packet marking and logging for IP traceback, International Journal of Internet Protocol Technology, Vol. 5, Nos. 1/2, 2010, pp. 81-91. 18. B. Al-Duwairi and G. Manimaran, Novel hybrid schemes employing packet marking and logging for IP traceback, IEEE Transactions on Parallel and Distributed Systems, Vol. 17, 2006, pp. 403-418. 19. I. Stoica and H. Zhang, Providing guaranteed services without per flow management, in Proceedings of ACM SIGCOMM, 1999, pp. 81-94. 20. D. Dean, M. Franklin, and A. Stubblefield, An algebragic appproach to IP traceback, ACM Transactions on Information and System Security, Vol. 5, 2002, pp. 119-137. 21. Z. Gao and N. Ansari, Enhanced probabilistic packet marking for IP traceback, in Proceedings of IEEE GLOBECOM, 2005, pp. 1676-1680. 22. C. Gong and K. Sarac, Toward a practical packet marking approach for IP traceback, International Journal of Network Security, Vol. 8, 2009, pp. 271-281. 23. M. Muthuprasanna, G. Manimaran, M. Manzor, and V. Kumar, Coloring the internet: IP Traceback, in Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006, pp. 589-598. 24. CAIDA, EB/OL, http://www.caida.org/research/topology. 25. R. K. Merton, The Matthew effect in science: The reward and communication systems of science are considered, Science 159 (3810), 1968, pp. 56-63. 26. S. McCreary and K. Claffy, Trends in wide area IP traffic patterns: A view from Ames internet exchange, in Proceedings of the 13th ITC Specialist Seminar on IP Traffic Modeling, Measurement and Management, 2000, pp. 1-25. 27. A. Broder and M. Mitzenmacher, Network applications of bloom filters: A survey, Internet Mathematics, Vol. 1, 2005, pp. 485-509. 28. Rocketfuel, EB/OL, http://www.cs.washington.edu/research/networking/rocketfuel. Dong Yan ( 阎 ) is a Ph.D. candidate in State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications (BUPT). His current research has focused on security of computer networks.

470 Yulong Wang ( 龙 ) received the Ph.D. degree in State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications in 2009. His current research interests include network security, vulnerability assessment and vulnerability elimination. Sen Su ( 苏 ) is a professor and Ph.D. supervisor at Beijing University of Posts and Telecommunications. His current research interests include network security, cloud computing and virtual network embedding. Fangchun Yang ( 杨 ) is a professor and Ph.D. supervisor at Beijing University of Posts and Telecommunications. He is a senior membership of CCF. His current research interests include network security, network intelligence and services.