Title :
On the use of path identification to block attack packets
Author_Institution :
Comput. Sci. Dept., Notre Dame Univ., Zouk Mosbeh, Lebanon
Abstract :
Many techniques have been proposed by the research community to mitigate the effect of flooding denial of service (DoS) attacks. The effects of DoS attacks are aggravated by the ability of attackers to hide the source of the attack packets. A widely used class of solutions. (e.g. trace-back) is based on marking packets, from source to destination, by intermediate routers and selectively blocking packets based on the path they traveled. In this paper we show that router level path identification offers more details then needed. We also show that packets originating from a group of devices will follow almost identical paths to the destination. Thus a single attacker can spoof its address in such a way that will lead to a whole group in the source domain to be labeled as attack source. We argue that a more coarse grained path identification, such as the autonomous system path identification, be used instead.
Keywords :
security of data; attack packet blocking; autonomous system path identification; denial of service attacks; router level path identification; Erbium; Floods; Internet; Strontium;
Conference_Titel :
Applications of Digital Information and Web Technologies, 2009. ICADIWT '09. Second International Conference on the
Conference_Location :
London
Print_ISBN :
978-1-4244-4456-4
Electronic_ISBN :
978-1-4244-4457-1
DOI :
10.1109/ICADIWT.2009.5273907