Design and Simulation Implementation of an Improved PPM Approach

Автор: Guo Fan, Feng Bo, Yu Min

Журнал: International Journal of Wireless and Microwave Technologies(IJWMT) @ijwmt

Статья в выпуске: 6 Vol.2, 2012 года.

Бесплатный доступ

Different from recent probabilistic packet marking (PPM) methods, Dynamic PPM may solve many problems of traditional methods, such as loss of marking information, hard to reconstruct attack path, low accuracy, and so on. A novel DPPM approach is proposed and the network simulation software (NS2) is used to verify the performance and efficiency of the approach by constructing simulation DOS environments. In comparison with PPM methods, simulation results show that DPPM is much better.

IP Traceback, DDOS, PPM, Network Security

Короткий адрес: https://sciup.org/15012836

IDR: 15012836

Список литературы Design and Simulation Implementation of an Improved PPM Approach

  • K. Park, H. Lee. ON the effectiveness of probabilistic packet marking for IP traceback. In : Proc. Of the IEEE Int'l Conf.on Communication 2004.2204.1008-1013.
  • T. Baba, S. Matsuda TracingNetwork Attacks to Their Sources[J].IEEE Internet Computing,2002,16(2):20-26.
  • R. Stone. Center Track: An IP Overlay Network for Tracking DoS Floods[A]. In :Proceedings of USENIX Security Symposium, 2000.
  • P. Ferguson, D. Senie. Network Ingress Filtering:Defeating Denial of Service Attacks which EmployIP Source Address Spoofing(RFC2827) The Internet Society, 2000.
  • R. Bajaj, P. Dharma. Improving Scheduling of Tasks in a HeterogeneousEnvironment[J]. IEEE Transactions,on Parallel and Distributed Systems, 2004, 15(2):107~118.
  • S. Savage. Network Support for IP Traceback[J]. .IEEE ACM tractions on networking, 2001, 9:226-237.
  • D.X. Song, A.Perrig. Advanced and authenticated marking schemes for IP traceback[C]. In: Proc of IEEE INFOCOM 2001, pp 878-886.
  • H. Burch, B. Cheswick. Tracing Anonymous Pacekets to Their Approximate Source[C]. Proc of Usenix LISA,New Orleans.200-12:313-3.
Статья научная