Posts: 1,061
Threads: 613
Joined: Feb 2010
Flexible Deterministic Packet Marking:An IP Traceback System to Find the Real source of Attacks
Abstractâ€Internet Protocol (IP) traceback is the enabling technology to control Internet crime. In this paper, we present a novel and practical IP traceback system called Flexible Deterministic Packet Marking (FDPM) which provides a defense system with the ability to find out the real sources of attacking packets that traverse through the network. While a number of other traceback schemes exist,FDPM provides innovative features to trace the source of IP packets and can obtain better tracing capability than others. In particular, FDPM adopts a flexible mark length strategy to make it compatible to different network environments; it also adaptively changes its marking rate according to the load of the participating router by a flexible flow-based marking scheme. Evaluations on both simulation and real system implementation demonstrate that FDPM requires a moderately small number of packets to complete the traceback process; add little additional load to routers and can trace a large number of sources in one traceback process with low false positive rates. The built-in overload prevention mechanism makes this system capable of achieving a satisfactory traceback result even when the router is heavily loaded. The motivation of this traceback system is from DDoS defense. It has been used to not only trace DDoS attacking packets but also enhance filtering attacking traffic. It has a wide array of applications for other security systems. Index Termsâ€DDoS attacks, IP traceback, performance evaluation, routers, security.
Presented By:
Yang Xiang, Member, IEEE, Wanlei Zhou, Member, IEEE, and Minyi Guo, Senior Member, IEEE
read full report
http://fabiestudents.cqu.edu.au/FCWViewe...o?id=23671
Posts: 3
Threads: 2
Joined: Mar 2010
i want a Flexiable Deterministic Packet Marking (FDPM) project .u give an project explanation and the project source code.
Posts: 2,481
Threads: 1,434
Joined: Mar 2010
ABSTRACT
Internet Protocol (IP) traceback is the enabling technology to control Internet crime. In this paper, we present a novel and practical IP traceback system called Flexible Deterministic Packet Marking (FDPM) which provides a defense system with the ability to find out the real sources of attacking packets that traverse through the network. While a number of other traceback schemes exist, FDPM provides innovative features to trace the source of IP packets and can obtain better tracing capability than others. In particular, FDPM adopts a flexible mark length strategy to make it compatible to different network environments; it also adaptively changes its marking rate according to the load of the participating router by a flexible flow-based marking scheme.
Evaluations on both simulation and real system implementation demonstrate that FDPM requires a moderately small number of packets to complete the traceback process; add little additional load to routers and can trace a large number of sources in one traceback process with low false positive rates. The built-in overload prevention mechanism makes this system capable of achieving a satisfactory traceback result even when the router is heavily loaded. The motivation of this traceback system is from DDoS defense. It has been used to not only trace DDoS attacking packets but also enhance filtering attacking traffic. It has a wide array of applications for other security systems.
Hardware specification
Processor Type : Pentium-IV
Speed : 2.4 GHZ
Ram : 256 MB RAM
Hard Disk : 80 GB HD
Software Specification
Operating System : Windows XP
Front End : JAVA Swing
Code Behind : JAVA
Database : SQL Server
Posts: 1
Threads: 0
Joined: Aug 2010
Posts: 1
Threads: 0
Joined: Feb 2011
Can U give me the source code in java please....Im waiting for that...
Posts: 3
Threads: 0
Joined: Mar 2011
How can we show simulations for FDPM scheme?
How to identify the DOS attack by using simulations.
How to adjust the mark length?
In flow based marking scheme ,which values should be taken for Lmax,Lmin.
what is the packet size.
Posts: 3
Threads: 0
Joined: Mar 2011
which value should be taken for the packet size?
Posts: 1
Threads: 0
Joined: Jun 2011
plesse send document to my id shaik.fayas009[at]gmail.com