By Topic

Demonstration Experiments Towards Practical IP Traceback on the Internet

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Wakasa, K. ; Japan Data Commun. Assoc., Tokyo, Japan ; Takemori, K. ; Kai, T. ; Hazeyama, H.

Recently, Distributed Denial of Service (DDoS) attacks have become a critical issue on the Internet. Theoretical approaches into traceback systems to counter these attacks have been actively researched. However, with no instances of actual application of traceback systems on the Internet, such a response has yet to achieve widespread adoption. This is because multiple autonomous systems (ASs) need to be linked to carry out end-to-end tracking, and this poses a number of issues, including (i) the operational and practical environmental constraints of installing equipment at a variety of Internet Exchange Points (IXPs), (ii) the need to establish operational procedures, and (iii) establishing the monitoring points needed to conduct the traceback. Given these factors, with the aim of achieving the widespread adoption of traceback systems on the Internet in Japan, in this paper we introduce the challenges posed by installing equipment at multiple ASs and report on tracking experiments conducted in response to simulated attacks. Specifically, in terms of (i) environmental constraints, this involved summarizing the size and access restrictions of installed equipment, and in terms of (ii) establishing operational procedures, this involved summarizing the role of operators from the outbreak of an incident to conducting traces and taking countermeasures. Additionally, we investigated the connection status of ASs in Japan to calculate (iii) the number of ASs in which equipment must be installed to satisfy the adoption rate required to carry out tracking.

Published in:

Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE

Date of Conference:

9-12 Jan. 2010