Analysis of Traceback Techniques

Udaya Kiran Tupakula*, Vijay Varadharajan

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

5 Citations (Scopus)

Abstract

Today's Internet is extremely vulnerable to Distributed Denial of service (DDoS) attacks. There is tremendous pressure on the sites performing online business and ISP's to protect their networks from DDoS attacks. Recently, several novel traceback techniques have been proposed to trace the approximate spoofed source of attack. Each proposed traceback technique has some unique advantages and disadvantages over the others. In this paper we will consider some of the novel traceback techniques and focus our discussion i) to raise some of the real time issues that can be addressed in the further research and ii) from the attackers perspective on how to generate DDoS attacks and remain untraced even if any of the traceback technique is deployed in the Internet. We will also demonstrate how attacks can be further amplified if ICMP traceback technique is deployed in the Internet and discuss techniques to minimise the additional attack traffic. We believe that the networks tend to become complex and more vulnerable to DDoS attacks if some of the proposed traceback techniques are deployed in the Internet.

Original languageEnglish
Title of host publicationACSW Frontiers 2006 - Proc. of the Fourth Australasian Symposium on Grid Computing and e-Research, AusGrid 2006 and the Fourth Australasian Information Security Workshop (Network Security), AISW 2006
EditorsRajkumar Buyya, Tianchi Ma, Reihaneh Safavi-Naini, Chris Steketee, Willy Susilo
Place of PublicationSydney, Australia
PublisherAustralian Computer Society
Pages115-124
Number of pages10
Volume54
ISBN (Print)1920682368, 9781920682361
Publication statusPublished - 2006
Event4th Australasian Symposium on Grid Computing and e-Research, AusGrid 2006 and 4th Australasian Information Security Workshop (Network Security), AISW 2006 - Hobart, TAS, Australia
Duration: 16 Jan 200619 Jan 2006

Other

Other4th Australasian Symposium on Grid Computing and e-Research, AusGrid 2006 and 4th Australasian Information Security Workshop (Network Security), AISW 2006
CountryAustralia
CityHobart, TAS
Period16/01/0619/01/06

Fingerprint

Dive into the research topics of 'Analysis of Traceback Techniques'. Together they form a unique fingerprint.

Cite this