Top Banner
Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University [email protected]
81

Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University [email protected].

Dec 25, 2015

Download

Documents

Claude Cameron
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Review of IP traceback

Ming-Hour Yang

The Department of Information & Computer Engineering

Chung Yuan Christian University

[email protected]

Page 2: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Outline

Introduction to (D)DoS attacks Why Traceback Traceback Schemes Hybrid IP traceback Conclusion

Page 3: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Introduction

DoS attack/DDoS attackFlooding based DoS attack

SYN flooding attack, SmurfSoftware exploit attack

LAND attack

IP source address spoofingHide the origin of attacker

Page 4: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Flooding-base DDoS Attacks

Page 5: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Challenges to Against DDoS Attack Hard to separate attack packets from legitimate ones

Attack traffic usually comprises legitimate packets. Source IP address can be forged

Attackers can hide themselves by forging source IP address randomly.

It is hard to identify malicious packets according to their source addresses.

Hard to prevent attack traffic from entering the Internet DDoS traffic is distributed. It could be too late if defense mechanisms drop attack packets in

the proximity of the victim. Why not Egress filtering?

Page 6: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Traffic in the network

Network architecture Core routersBorder routers

R9

R2

R5

R4

R3

R1

R7

R8

R6

Victim

Host

Attacker

Legitimate traffic

Link

Attack path

Page 7: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Give a Tracking Clue to Attack packets

Packet logging Intermediate nodes huge storage support Low false positive rate by Bloom Filter

Packet Marking Marking Field is limited while marking on IP Header, Low

Precision No storage overhead

Messaging Routers probabilistically send ICMP messages, which

contains the forwarding nodes the packet travel through, to the destination node.

Victims reconstruct attack paths from received ICMP messages.

Backscatter messages (ICMP error messages)

Page 8: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Traceback Approaches

Flooding based DoS attackPacket marking-PPM, DPM ICMP message – iTrace(draft-ietf-itrace-04.txt

), backscatter Software exploits attack

Packet logging-SPIE,Bloom FilterHybrid IP traceback

Page 9: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Assumptions

The attackers knows the traceback approaches The attackers intend to pollute the tracing data The router knows the routers or its local network where

the packets come from. All of the routers work together in marking and logging

scheme and reconstruction scheme The path of traffic or the topology might be changed, but

not often Packet marking schemes use the identification field,

flags field and fragment offset field of IP header to be the 32-bit marking field, or use identification field to be 16-bit marking field

Page 10: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

LOCATE ATTACKERS IN ONE PACKET

Packet-marking schemes

Packet-logging schemes

Hybrid schemes

Page 11: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

R2R1

Fragments of R2's IP

…1 2 K-1 K

PnP1 ...

PnP1 ...

Packet-Marking Schemes

11

Must collect a lot of packets No storage requirement Node sampling Edge sampling Path

Page 12: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Packet-Logging Schemes

12

Single packet traceback High storage requirement Software exploit D/DOS attack

R2R1PnP1 ...

1

0

1

1

0

H1(P1.digest)H2(P2.digest)

HK(Pn.digest)

Page 13: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Hybrid IP Traceback

13

Single packet traceback Reduce storage requirement Software exploit D/DOS attack Hybrid IP Traceback Categories

Digest packetsLog path information

Page 14: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Hybrid IP traceback-Packet Oriented Choi and Dai

Fixed-length Does not use the marking field efficiently, if degree

of router is not a power of twoHuffman codes

Using Huffman coding to reduce the bits required for marking

Better performance when the traffic distribution for each interface is unequal

Page 15: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Hybrid IP traceback-Packet Oriented Malliga and Tamilarasi

MRT and MORE scheme New marking field = marking field × degree + IN Old marking field = marking field ÷ degree IN = marking field MOD degree

MRT uses 32-bit marking fieldMORE uses 16-bit marking field

Page 16: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Examples of marking-Packet oriented hybrid IP traceback

R3R2R1

Host

fixed-length 00120002

Huffman codes on R2

Huffman codes on R3

0102 0112 1002 1012

10121002 1102 1112 002 012

11121102 002 012 102

Interface number 10 2 3 4 5

11

1

0 0

0

2

22

3

34

3

4

5

000000002MRT and MORE000000012Huffman codes

000000012

000011112000010112

001111012

Marking field (8bits)000000012 000010012 010011012Fixed-length

R1, D(R1) = 4 R2, D(R2) = 5 R3, D(R3) = 6

R3R2R1

Host

fixed-length 00120002

Huffman codes on R2

Huffman codes on R3

0102 0112 1002 1012

10121002 1102 1112 002 012

11121102 002 012 102

Interface number 10 2 3 4 5

11

0

0 1

5

2

22

3

34

3

4

0

000000002MRT and MORE000000012Huffman codes

000000002

000011112000000002

001111012

Marking field (8bits)000000012 000010012 010011012Fixed-length

R1, D(R1) = 4 R2, D(R2) = 5 R3, D(R3) = 6

Page 17: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Problems in packet oriented hybrid IP traceback schemes Logging schemes in Huffman codes, MRT

and MORELog <digest, marking field> into log table and

clear the marking field High storage requirement False positive rate Exhaustive search in reconstruction schemes

Page 18: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Path based hybrid IP traceback schemes A Novel Approach for Single-Packet IP Traceback Based

on Routing Path

RIHT: A Novel Hybrid IP Traceback Scheme

Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy(HAHIT)

Storage-Efficient 16-Bit Hybrid IP Traceback with Single Packet

18

Page 19: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

A Novel Approach for Single-Packet IP Traceback Based on Routing Path Packet Marking

Establish and switch label by MPLS

Marking information Upstream router ID Inlabel

Bit offset0

326496

128

0-3 4-7 8-15 16-18 19-31Version Header length TOS Total length

Identification field Flag Fragment offsetTTL Protocol Header checksum

Source addressDestination address

160or

196+

Options160

Payload (first 8bytes)

Page 20: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Log every packets-MPLS hybrid

20

Log the mark Switch label and router ID on the packet

R2R1

Inlabel Packet flow Outlabel

L F L

Page 21: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

21

Exhaustive search required for table probing

Inlabel Packet flow Outlabel

L F L

131071

R2R1

Path reconstruction –MPLS hybrid

Page 22: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

MPLS hybrid traceback scheme

22

Advantage Storage was bounded by path number

Disadvantage Logging on every router High computation loads and impractical

Page 23: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

RIHT: A Novel Hybrid IP Traceback Scheme

Packet markingPacket comes from the LANPacket comes from other routers

New marking field = marking field × (degree +1) + (IN +1)

Bit offset0

326496

128

0-3 4-7 8-15 16-18 19-31Version Header length TOS Total length

Identification field Flag Fragment offsetTTL Protocol Header checksum

Source addressDestination address

160or

196+

Options160

Payload (first 8bytes)

Page 24: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Log the mark - RIHT Overwhelm the mark Index

H(mark)Search empty indexed entry by quadratic

probing New mark = index × (degree +1)

Page 25: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Example of marking and logging-RIHT

‧‧‧

8

R1

D(R1)= 3

R2

D(R2)= 3R3

D(R3)= 4

marknew = ( 60 x 4 + 2 ) = 242

0

00

1

1

1

2

2

23

marknew = 242 x 4 + 2 = 970needs to log

P.m

ark = 242

P.mark = 32 P.mark = 163

P.mark = 60

marknew = ( 32 x 5 + 3 ) = 163

Source router‧‧‧

242‧‧‧

marknew = ( 8 x 4 + 0 ) = 32

mark

0

‧‧‧

Hash Table, m = 16

IN

‧‧‧

2‧‧‧

R4

R5

R6 R7

Page 26: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Path reconstruction -RIHT

26

𝑜𝑙𝑑 𝑚𝑎𝑟𝑘( )= ÷( 𝑜𝑟 𝑖𝑛𝑑𝑒𝑥 𝑚𝑎𝑟𝑘 𝑑𝑒𝑔𝑟𝑒𝑒+1)

𝐼𝑛𝑡𝑒𝑟𝑓𝑎𝑐𝑒. = 𝐼𝐷 𝑚𝑎𝑟𝑘 𝑚𝑜𝑑( +1)−1𝑑𝑒𝑔𝑟𝑒𝑒

Page 27: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Example of path reconstruction -RIHT

‧‧‧

8

R1

D(R1)= 3

R2

D(R2)= 3R3

D(R3)= 4

0

00

1

1

1

2

2

23

mark

req = 242

markreq = 32 markreq = 163

markreq = 60Source router

‧‧‧

242‧‧‧

mark

0

‧‧‧

Hash Table, m = 16

IN

‧‧‧

2‧‧‧

R4

R5

R6 R7

IN'ij = 163 % 5 = 3

markold = 163 / 5 = 32IN'i

j = 32 % 4 = 0 = IN'i-1

index = 32 / 4 = 8 ≠ 0logged on this router

loads HT[index] gets markold = 242

and IN'ij = 2

IN'ij = 242 % 4 = 2

markold = 242 / 4 = 60

Page 28: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

RIHT Hybrid Traceback Scheme

28

Advantage Storage was bounded by path number

Disadvantage False positive rate grow with packet numbers

Page 29: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy(HAHIT)

29

16 bits mark to mitigate the false positive

Bit offset0

326496

128

0-3 4-7 8-15 16-18 19-31Version Header length TOS Total length

Identification field Flag Fragment offsetTTL Protocol Header checksum

Source addressDestination address

160or

196+

Options160

Payload (first 8bytes)

Page 30: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Log table of HAHIT

‧‧‧

Source router‧‧‧

markindex

0

HTk

UI

‧‧‧

l Pj.mark UIi‧‧‧

‧‧‧

‧‧‧

[Tt, Tt+1 )

Small index small table

Easy overflow

Table number

Page 31: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

R1

D(R1)= 3

R2

D(R2)= 3 R3

D(R3)= 4

marknew = 7321 x 4 + (0 + 1) = 29285

2

1

0

2

1

0

1

0 2 3

marknew = 29285 x 4 + (2 + 1) = 117143needs to log

k = Htable(P1.srcIP) = 0l1 = Hindex(P1.mark) = 1

P1 .m

ark = 29285

P1.mark = 4 P1.mark = 23

P1.mark = 7321

marknew = 4 x 5 + (2 + 1) = 23

marknew = ( 1 x 4 ) = 4

R4

R5

R6 R7

1

Source router

17281

markindex

0

R2's HT0

UI

2

2

3

4

5

6

7

[T1, T∞ )marknew = Pj.mark x ( D(Ri) + 1 ) + (UIi + 1)

Example of marking and logging-HAHIT

Page 32: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Example of marking and logging-HAHIT

R1

D(R1)= 3

R2

D(R2)= 3 R3

D(R3)= 4

marknew = 4166 x 4 + (0 + 2) = 16667

2

1

0

2

1

0

1

0 2 3

marknew = 16667 x 4 + (2 + 1) = 66671needs to log

k = Htable(P2.srcIP) = 3l2 = Hindex(P2.mark) = 6

P2 .m

ark = 16667

P2.mark = 20 P2.mark = 103

P2.mark = 4166

marknew = 20 x 5 + (2 + 1) = 103

marknew = ( 5 x 4 ) = 20

R4

R5

R6 R7

1

Source router

30170

markindex

0

R2's HT3

UI

1

2

3 32177 1

4 16576 0

5 16667 2

6 24801 2

7 19651 2

[T0, T∞ )

1

2

34

5

marknew = Pj.mark x ( D(Ri) + 1 ) + (UIi + 1)

Page 33: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Example of marking and logging-HAHIT

R1

D(R1)= 3

R2

D(R2)= 3 R3

D(R3)= 4

2

1

0

2

1

0

1

0 2 3

marknew = 17282 x 4 + (2 + 1) = 69131needs to log

k = Htable(P3.srcIP) = 0l3 = Hindex(P3.mark) = 6

R4

R5

R6 R7

P3.mark = 17282

1

Source router

29285

markindex

0

R2's HT0

UI

2

2 25109 0

3 23428 1

4 27116 1

5 27718 0

6 20293 0

7 17203 1

[T0, T∞ )marknew = Pj.mark x ( D(Ri) + 1 ) + (UIi + 1)

Page 34: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Example of marking and logging-HAHIT

R1

D(R1)= 3

R2

D(R2)= 3 R3

D(R3)= 4

2

1

0

2

1

0

1

0 2 3

marknew = 17282 x 4 + (2 + 1) = 69131needs to log

k = Htable(P3.srcIP) = 0l3 = Hindex(P3.mark) = 6

P3.mark = 24 P3.mark = 123

marknew = 24 x 5 + (2 + 1) = 123

marknew = ( 6 x 4 ) = 24

R4

R5

R6 R7

P3.mark = 17282

1

Source router

29285

markindex

0

R2's HT0

UI

2

2 25109 0

3 23428 1

4 27116 1

5 27718 0

6 20293 0

7 17203 1

1

Source router

markindex

0

R2's HT0

UI

2

3

4

5

6 17282 1

7

[T0, T1)[T1, T∞ )marknew = Pj.mark x ( D(Ri) + 1 ) + (UIi + 1)

Page 35: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Example of path reconstruction -HAHIT

R1

D(R1)= 3

R2

D(R2)= 3

R3

D(R3)= 4

2

1

0

2

1

0

1

0

2

3

mark

req = 29585

markreq = 4

markreq = 23

markreq = 7396R4

R5

R6 R7

UI3 = 23 % 5 - 1 = 2markold = 23 / 5 = 4

UI2 = 4 % 4 - 1 = -1 l1 = 4 / 4 = 1 ≠ 0

T0 < Tr < T1

k = Htable(srcIPreq) = 0

gets markold = 29585and UI2 = 2

UI1 = 29585 % 4 - 1 = 0markold = 29585 / 4 = 7396

1

Source router

29285

markindex

0

R2's HT0

UI

2

2 25109 0

3 23428 1

4 27116 1

5 27718 0

6 20293 0

7 17203 1

[T0, T1)

Page 36: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Analysis Skitter Project topology by CAIDA

Average hop count of paths is 15.86 Total number of its routers is 130,267 Average upstream degree is 3.89, max is 420 244,914 complete paths

Page 37: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Analysis

Number of paths could hash table log The load factor of hash table is α = l ÷ m

l is the number of logged paths in hash table m is the size of hash table

Upper bound of α is used to be 0.5 Hash table can log m ÷ 2 paths

If the hash table is full Double the size of hash table Log into different hash tables by

G(left 24b its of P.srcIP) mod j j is the number of hash tables

Page 38: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Maximum Size of Log Table

38

2 15 28 41 54 67 80 93 1061191321451581711841972102232362492622752883013143273403533663793924054184314

8

16

32

64

128

256

512

1024

2048

4096

8191.99999999998

Degree of Router

Lo

g T

able

’s S

ize 

Page 39: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

4 8 16 32 64 128 256 512 1024 2048 4096 8191

0

100000

200000

300000

400000

500000

600000

700000

800000

900000

1000000

1

3

5

7

9

15

44

63

Log Table’s Size

Ave

rag

e L

og

gin

g T

imes

(10T

ho

usa

nd

)

Log Table’s Size and Threshold

39

Log table size:8

Threshold:10

Page 40: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Reduce storage overhead Improve storage overhead caused by quadratic

probing Reduce times of duplicate log

Storage-Efficient 16-Bit Hybrid IP Traceback with Single Packet

40

Page 41: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Marking Scheme(2)

41

To determine packet status

To compute the marknew

Page 42: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Compute The Marknew(1)

42

if Pj is come from LAN

Pj.mark = 0

Else

marknew = Pj.mark × (D(Ri) + 1) + UIi + 1

if marknew > 65535 then

Logging and compute marknew

Else

Pj.mark = marknew

endif

forward the packet to the next router

end

To determine packet status

To compute the marknew

Page 43: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Compute The Marknew(2)

43

if Pj is come from LAN

Pj.mark = 0

Else

marknew = Pj.mark × (D(Ri) + 1) + UIi + 1

if marknew > 65535 then

Logging and compute marknew

Else

Pj.mark = marknew

endif

forward the packet to the next router

end

To determine packet status

To compute the marknew

Page 44: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Determine Packet Status

44

if Pj is come from LAN

Pj.mark = 0

Else

marknew = Pj.mark × (D(Ri) + 1) + UIi + 1

if marknew > 65535 then

Logging and compute marknew

Else

Pj.mark = marknew

endif

forward the packet to the next router

end

To determine packet status

To compute the marknew

Page 45: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Marking scheme

45

Page 46: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Marking Scheme

46

Page 47: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

𝐷(𝑅𝑖) threshold≦ log more packet mark in a log table Reduce times of duplicate log

𝐷(𝑅𝑖)>threshold Log UI in the log table

Logging Scheme(1)

47

‧‧‧

Source router‧‧‧

markindex

0

HTk

l Pj.mark‧‧‧

‧‧‧

[Tt, Tt+1 )

‧‧‧

Source router‧‧‧

markindex

0

HTk

UI

‧‧‧

l Pj.mark UIi‧‧‧

‧‧‧

‧‧‧

[Tt, Tt+1 )

Page 48: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Logging Scheme (2)

48

Compute the marknew

Log packet mark(packet mark&UI)

Get index of log table

Determine log table status

Get log table number

Page 49: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

49

Get Log Table Number Compute the marknew

Log packet mark(packet mark&UI)

Get index of log table

Determine log table status

Get log table number

Page 50: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

50

Determine Log Table StatusCompute the marknew

Log packet mark(packet mark&UI)

Get index of log table

Determine log table status

Get log table number

Page 51: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Get Index of Log Table

51

Compute the marknew

Log packet mark(packet mark&UI)

Get index of log table

Determine log table status

Get log table number

Page 52: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Log Packet Mark

52

Compute the marknew

Log packet mark(packet mark&UI)

Get index of log table

Determine log table status

Get log table number

Page 53: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Compute Marknew

53

Compute the marknew

Log packet mark(packet mark&UI)

Get index of log table

Determine log table status

Get log table number

Page 54: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

‧‧‧

Source router‧‧‧

markindex

0

HTk

UI

‧‧‧

l Pj.mark UIi‧‧‧

‧‧‧

‧‧‧

[Tt, Tt+1 )

54

Page 55: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

55

Logging Scheme – ( i) 𝐷 𝑅 ≦threshold

Page 56: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

1

Source router

17282

markindex

0

R2's HT0

[T1, T∞ )

P4.mark = 68

1

Source router

17952

markindex

0

R2's HT0

2 25109

3 23428...

[T0, T1)

9 26227

10 20238

11 29285

R1

D(R1)= 3

R2

D(R2)= 3R3

D(R3)= 4

2

1 0

2

1

0

1

0 2 3

R5

R6 R7

P4.mark = 343

P4.mark = 17282

Logging Scheme – Table has filled up

56

Page 57: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Logging Scheme – Mark had existed

57

1

Source router

25689

markindex

0

R3's HT3

UI

1

2 30958 1

3 64015 2

4 17094 0

5 26785 2

6 24187 2

7 17453 1

[T0, T∞ )

R1

D(R1)= 3

R2

D(R2)= 3R3

D(R3)= 4

2

1 0

2

1

0

1

0 2 3

R5

R6 R7

P2.mark = 64015P2.mark = 15

P2.mark = 4000

P2.mark = 16003

Page 58: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Reconstruction Scheme

58

Send reconstruction request to upstream router

Find out log table that has packet mark

Determine the router status

Compute the log table’s index

Determine the logging status

Compute upstream interface ID

Get reconstruction request

Page 59: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Get Reconstruction Request

59

input:Pj.mark, Pj.srcIP, Tr

UIi = Pj.mark % (D(Ri) + 1) – 1

if UIi = -1

The packet had log in this router

else

markold = Pj.mark / (D(Ri) + 1)

send reconstruction request with markold and Pj.srcIP to upstream router by UIi

Endif

Send reconstruction request to upstream router

Find out log table that has packet mark

Determine the router status

Compute the log table’s index

Determine the logging status

Compute upstream interface ID

Get reconstruction request

Page 60: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

60

input:Pj.mark, Pj.srcIP, Tr

UIi = Pj.mark % (D(Ri) + 1) – 1

if UIi = -1

The packet had log in this router

else

markold = Pj.mark / (D(Ri) + 1)

send reconstruction request with markold and Pj.srcIP to upstream router by UIi

endif

Compute Upstream Interface ID Send reconstruction request to upstream

router

Find out log table that has packet mark

Determine the router status

Compute the log table’s index

Determine the logging status

Compute upstream interface ID

Get reconstruction request

Page 61: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Determine The Logging Status

61

Send reconstruction request to upstream router

Find out log table that has packet mark

Determine the router status

Compute the log table’s index

Determine the logging status

Compute upstream interface ID

Get reconstruction request

Page 62: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

62

Compute Log Table’s Index Send reconstruction request to upstream

router

Find out log table that has packet mark

Determine the router status

Compute the log table’s index

Determine the logging status

Compute upstream interface ID

Get reconstruction request

Page 63: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Determine The Router Status

63

Send reconstruction request to upstream router

Find out log table that has packet mark

Determine the router status

Compute the log table’s index Determine the logging status

Compute upstream interface ID

Get reconstruction request

Page 64: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Find Out Log Table(1)

64

Send reconstruction request to upstream router

Find out log table that has packet mark

Determine the router status

Compute the log table’s index

Determine the logging status

Compute upstream interface ID

Get reconstruction request

Page 65: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Find Out Log Table(2)

65

Send reconstruction request to upstream router

Find out log table that has packet mark

Determine the router status

Compute thelog table’s index

Determine the logging status

Compute upstream interface ID Get reconstruction request

Page 66: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Send Request to Upstream Router

66

Send reconstruction request to upstream router

Find out log table that has packet mark

Determine the router status Compute the log table’s index

Determine the logging status

Compute upstream interface ID

Get reconstruction request

Page 67: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

67

l = Pj.mark /(D(Ri) + 1)

if not l = 0

this router is not the nearest border router to the attacker

else

this router is the nearest border router to the attacker

endif

Reconstruction Scheme-D(Ri)>threshold(1)

Page 68: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

68

Reconstruction Scheme-D(Ri)>threshold(2)

Page 69: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Reconstruction Scheme

69

R1

D(R1)= 3

R2

D(R2)= 3R3

D(R3)= 4

2

1 0

2

1

0

1

0 2 3

R5

R6 R7

P1.mark = 29285

P1.mark = 172P1.mark = 863

P1.mark = 7321

Page 70: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

70

1

Source router

17282

markindex

0

R2's HT0

[T1, T∞ )

1

Source router

17952

markindex

0

R2's HT0

2 25109

3 23428...

[T0, T1)

9 26227

10 20238

11 29285

R1

D(R1)= 3

R2

D(R2)= 3R3

D(R3)= 4

2

1 0

2

1

0

1

0 2 3

R5

R6 R7

P1.mark = 29285

P1.mark = 172P1.mark = 863

P1.mark = 7321

Page 71: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

1

Source router

25689

markindex

0

R3's HT3

UI

1

2 30958 1

3 64015 2

4 17094 0

5 26785 2

6 24187 2

7 17453 1

[T0, T∞ )

R1

D(R1)= 3

R2

D(R2)= 3R3

D(R3)= 4

2

1 0

2

1

0

1

0 2 3

R5

R6 R7

P2.mark = 64015P2.mark = 15

P2.mark = 4000

P2.mark = 16003

71

 

Reconstruction Scheme-D(Ri)>threshold

Page 72: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Analysis Storage overhead

Average logging times Storage overhead in worst case Storage overhead in average case Average storage overhead in worst case

Computation overhead Packet logging Path reconstruction

False positive

72

Page 73: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Storage Overhead – Average logging times

73

1 2 3 4 50

1

2

3

4

5

6

7

8

HAHITOur SchemeRIHT

Packets Numbers(10M)

Ave

rag

e L

og

gin

g T

imes

Page 74: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Storage Overhead – Worst case

74

Log table size remains intact

Storage overhead of the largest router Send 0.1M~50M

packets into the network

Storage Overhead

Our Scheme 0.7MB ~ 0.8MB

HAHIT 1.5MB ~ 2MB

RIHT 320KB

0.1 1 2 3 4 50

0.51

1.52

2.53

3.5

HAHIT Our SchemeRIHT

Packet Numbers (10M)

Sto

rag

e

Ov

erh

ea

d

(MB

)

Page 75: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Storage Overhead – Average case

75

Log table size not remains intact

Storage overhead of the largest router Send 0.1M~50M

packets into network

Storage Overhead

Our Scheme 172KB ~ 220KB

HAHIT 1.5MB ~ 2MB

RIHT 320KB

0.1 1 2 3 4 50

0.51

1.52

2.53

3.5

HAHIT RIHTOur Scheme

Packet Numbers (10M)

Sto

rag

e

Ov

erh

ea

d

(MB

)

Page 76: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Average Storage Overhead – Worst case

76

Average storage of all routers

Log table size remains intact

Storage overhead of the largest router Send 0.1M~50M

packets into network

Storage Overhead

Our Scheme 0.5MB

HAHIT 1.5MB

RIHT 0.37MB

1 2 3 4 50

0.2

0.4

0.6

0.8

1

1.2

1.4

1.6

1.8

HAHIT Our SchemeRIHT

Packet Numbers (10M)

Sto

rag

e

Ov

erh

ea

d

(MB

)

Page 77: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Computation Overhead – Packet logging

77

Computation overhead HAHIT and RIHT’s expectations of collision

times is 2 Our scheme’s expectations of probing times

is 4.5 and 6

75% of our probes is 0

Average probing times is 0.43

Probability of log table filled up is 0.008

Page 78: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Computation Overhead – Path reconstruction

78

1 2 3 4 50

0.5

1

1.5

2

2.5

HAHIT Our SchemeRIHT

Packet Numbers (10M)

Av

era

ge

Pro

bin

g

Tim

es

Average Probing Times

Our Scheme

2

HAHIT 2

RIHT 1

Our Scheme、 HAHIT Find out log table Query mark

logged in the table

Our table is difficult to filled up than HAHIT

Page 79: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

False Positive

79

1 2 3 4 50

2000000

4000000

6000000

8000000

10000000

12000000

14000000

0 0 0 0 0

RIHTOur SchemeHAHIT

Packet Numbers(10M)

Fa

lse

Po

sit

ive

s

Page 80: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Conclusion

80

Single packet traceback

Storage overhead is bound by the number of paths

Reassembly of fragmented packets

Low storage overhead

Page 81: Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University mhyang@cycu.edu.tw.

Thanks for your attention

81