Title :
IP Traceback Methodology Using Markov Chain and Bloom Filter in 802.16e
Author :
Do Hoon Kim ; Hoh, P.I. ; Yoon, Byungsik
Author_Institution :
Dept. of Comput. Sci. & Eng., Korea Univ., Seoul
Abstract :
Recently, network resource is extremely vulnerable to DDoS attacks which has become a pressing problem due to scarce an efficient method to locate the real attacker. Especially, the more network topology advanced and complex such as 802.16e (WiBro), IP traceback is difficult. According to, in this paper, the IP Traceback methodology using Markov chain based on XOR operation is proposed in 802.16e. Also the paper provides a traceback method including: receiving data including access control router information according to a path of an attacker; filtering the data to hash the data, and storing the resultant hashed information; determining whether the data is normally received on the basis of the hashed information; and predicting a path loss on the basis of the determination result. Therefore, it is possible to perform an accurate IP traceback using a probabilistic packing marking method and a hash-based traceback method.
Keywords :
IP networks; Markov processes; cryptography; telecommunication network topology; wireless LAN; 802.16e; DDoS attacks; IP traceback; Markov chain; WiBro; bloom filter; hash-based traceback; network resource; network topology; probabilistic packing marking; Access control; Computer crime; Computer science; IP networks; Information filtering; Information filters; Information technology; Network topology; Pressing; Protocols; 802.16e; Bloom Filter; IP Traceback; Markov Chain; Probabilistic Packet Marking;
Conference_Titel :
Convergence and Hybrid Information Technology, 2008. ICCIT '08. Third International Conference on
Conference_Location :
Busan
Print_ISBN :
978-0-7695-3407-7
DOI :
10.1109/ICCIT.2008.274