Abstract
In this paper we present robust algorithms of transmission and reconstruction of attacking path(s) in IDS for providing traceback information in IP packets without requiring interactive operational support from Internet Service Providers, which is based on IP address compression techniques, polynomial theory and techniques from algebraic coding theory. Our best scheme has improved robustness over previous combinatorial approaches, both for noise elimination and multiple-path re-construction. Another key advantage of our schemes is that they will automatically benefit from any improvement in the underlying mathematical techniques, for which progress has been steady in recent years.
This work is supported by grants from the National Natural Science Foundation of China (Grant No. #60203004 & #2001AA142080)
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Yang, L., Zhang, J.-Z., Hou, X.-R.: Nonlinear Algebraic Equation System and Automated Theorem Proving. Shanghai Scientific and Technological Education Published House, Shanghai (1996)
Guruswami, V., Sudan, M.: Improved decoding of Reed-Solomon and algebraicgeometric codes. IEEE Transactions on Information Theory 45, 1757–1767 (1999)
Dean, D., Franklin, M., Stubblefield, A.: An Algebraic Approach to IP Traceback. In: Network and Distributed System Security Symposium, NDSS 2001 (February 2001)
Sudan, M.: Decoding of Reed Solomon codes beyond the error-correction bound. Journal of Complexity 13(1), 180–193 (1997)
Press, W.H., Flannery, B.P., Teukolsky, S.A., Vetterling, W.T.: Numerical Recipes in FORTRAN: The Art of Scientific Computing. Cambridge University Press, Cambridge (1992)
Berlekamp, E., Welch, L.: Error correction of algebraic block codes. United States Patent 4, 490–811 (1986)
Wu, L., Haixin, D., et al.: Wavelet-Based Analysis of Network Security Databases. In: International Conference of Communication Technology, Beijing, April 9-11, pp. 372–377 (2003)
Baker, F.: Requirements for IP Version 4 Routers. RFC 1812 (June 1995)
Stoica, I., Zhang, H.: Providing Guaranteed Services Without Per Flow Management. In: Proceedings of the 1999 ACM SIGCOMM Conference, Boston, MA, August 1999, pp. 81–94 (1999)
Claffy, K., McCreary, S.: Sampled Measurements from June 1999 to December 1999 at the AMES Inter-exchange Point. Personal Communication (January 2000)
Kent, C., Mogul, J.: Fragmentation Considered Harmful. In: Proceedings of the 1987 ACM SIGCOMM Conference, Stowe, VT, August 1987, pp. 390–401 (1987)
Mogul, J., Deering, S.: Path MTU Discovery. RFC 1191 (November 1990)
Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical network support for IP traceback. In: 2000 ACM SIGCOMM Conference (August 2000)
CERT coordination center denial of service attacks (February 1999), http://www.cert.org/tech_tips/denial_of_service.html
Dittrich, D.: The “stacheldraht” distributed denial of service attack tool (December 1999), http://staff.washington.edu/dittrich/misc/stacheldraht.analysis.txt
Dittrich, D.: The ”Tribe Flood Network” distributed denial of service attack tool (October 1999), http://staff.washington.edu/dittrich/misc/tfn.analysis
Liu, W., Duan, H., Ren, P., et al.: Wavelet Based Data Mining And Querying In Network Security Databases. In: International Conference on Machine Learning and Cybernetics 2003, Xian, China, November 2-5 (2003)
Bellovin, S.M.: ICMP traceback messages (March 2000), http://search.ietf.org/internet-drafts/draftbellovin-itrace-00.txt
Schneier, B.: Applied Cryptography, 2nd edn. John Wiley and Sons, Chichester (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, W., Duan, HX., Wu, JP., Ren, P., Lu, LH. (2004). Distributed IDS Tracing Back to Attacking Sources. In: Li, M., Sun, XH., Deng, Qn., Ni, J. (eds) Grid and Cooperative Computing. GCC 2003. Lecture Notes in Computer Science, vol 3032. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24679-4_146
Download citation
DOI: https://doi.org/10.1007/978-3-540-24679-4_146
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21988-0
Online ISBN: 978-3-540-24679-4
eBook Packages: Springer Book Archive