Defending Against Spoofed Ddos Attacks With Path Fingerprint
Defending Against Spoofed Ddos Attacks With Path Fingerprint
Defending Against Spoofed Ddos Attacks With Path Fingerprint
www.elsevier.com/locate/cose
KEYWORDS
Network security;
Intrusion detection;
DDoS;
IP spoofing
Abstract In this paper, we propose a new scheme, called ANTID, for detecting and
filtering DDoS attacks which use spoofed packets to circumvent the conventional
intrusion detection schemes. The proposed anti-DDoS scheme intends to complement, rather than replace conventional schemes. By embedding in each IP packet
a unique path fingerprint that represents the route an IP packet has traversed,
ANTID is able to distinguish IP packets that traverse different Internet paths. In
ANTID, a server maintains for each of its communicating clients the mapping from
the clients IP address to the corresponding path fingerprint. The construction and
renewal of these mappings is performed in an on-demand fashion that helps to
reduce the cost of maintenance. With presence of the mapping table, the onset of
a spoofed DDoS attack can be detected by observing a surge of spoofed packets.
Consequently, spoofed attack packets are filtered so as to sustain the quality of
protected Internet services. ANTID is lightweight, robust, and incrementally
deployable. Our experiment results showed that the proposed scheme can detect
99.95% spoofed IP packets and can discard them with little collateral damage to
legitimate clients. It also showed that the higher the aggregated attack rate is, the
sooner the attack can be detected.
2005 Elsevier Ltd. All rights reserved.
Introduction
Distributed Denial-of-Service (DDoS) attacks pose
a major threat to the availability of Internet
*
0167-4048/$ - see front matter 2005 Elsevier Ltd. All rights reserved.
doi:10.1016/j.cose.2005.03.005
572
subsequently instructs these compromised hosts to
attack the service by exhausting a target resource.
Due to the lack of built-in security mechanisms in
the current Internet infrastructure, conducting
a DDoS attack is easy. An attacker can easily get
access to a large number of insecure computers
with exploit/attack programs, such as Trinoo, TFN
and TFN2k (CERT Coordination Center, 1999a,b,c,
2000; Dittrich, 1999a,b). On the other hand,
defending against DDoS attacks is extremely difficult because there is usually no explicit attack
pattern to distinguish legitimate packets from
malicious ones. Moreover, to hide the sources of
attack traffic and circumvent DDoS defense mechanisms relying on inspecting IP header fields, DDoS
attack programs generally fill IP header fields,
especially the 32-bit source IP address, with
randomized values. This IP spoofing technique
has made the detection and filtering of DDoS
traffic extremely difficult, and it has become
a common feature of the many DDoS attack tools.
To design an effective and feasible DDoS countermeasure, there are several requirements a DDoS
defense mechanism should meet. These requirements are listed as follows.
Discrimination: The ability of discriminating
legitimate packets from attacking packets is
considered the first fundamental requirement
of a DDoS defense mechanism. In fact, this is
a very challenging problem. Specifically, since
most of current DDoS attack tools generate
spoofed IP packets, the ability to identify
spoofed IP packets becomes a key in defending
against DDoS attacks in which spoofed IP
packets dominate a significant share of attack
traffic.
Lightweight: The defense of DDoS mechanism
should not impose substantial load on both the
Internet routing infrastructure and the victim.
It is clear that heavy load imposed on Internet
core routers will seriously affect the throughput of these routers. For instance, complex
packet filtering operations should not be involved on the path of packet forwarding on
core routers. Moreover, the load on victims
should also be lightweight. Otherwise, the
defense mechanism itself will become vulnerable to DDoS attacks.
Loose cooperations: The defending scheme
should avoid the assumption that tight cooperation is required among ISPs. This is
because cooperation normally requires complex coordinations among ISPs and therefore
incurs substantial overhead. This will make
deployment of the DDoS defense mechanism
573
unnecessary to do so since the set of IP addresses
which frequently visits a normal site usually takes
a relatively small portion of all live IP addresses
(Jung et al., 2002; Peng et al., 2003). At the same
time, building such a mapping table containing
only frequently contacted clients will greatly reduce the storage requirement and lookup time of
an Internet server. Thus, in addition to the proposed scheme for identifying/filtering spoofed IP
packets with path fingerprints, we give an efficient
method that enables an Internet server to construct and update the database in an on-demand
fashion. In this way, a mapping of an IP address is
created or updated only when the Internet server
receives an IP packet from the IP address or when
there are changes on the Internet path between
the server and the IP address.
There are two execution modes in the proposed scheme, namely monitor mode and filter
mode. By default, the proposed scheme stays in
the monitor mode. In this mode, the proposed
scheme collects and updates the path fingerprints of clients who want to connect to the
protected Internet server. No spoofed packet is
discarded in this mode. However, once the rate
of spoofed packets received exceeds a predefined threshold, the proposed scheme switches
to the filter mode. In the filter mode, spoofed
packets and IP packets sent from infrequently
contacted clients (that is, clients whose IP
addresses and correspondent path fingerprints
are not yet recorded) are discarded to guarantee
service quality to frequent clients.
ANTID has the advantages of strong incremental
deployment property, lightweight processing load
for marking, decoding and filtering, and strong
incentive of deployment. It does not require
cooperations between ISP networks, and the filtering of spoofed DDoS packets is performed on
a per packet basis. ANTID also possesses other
useful characteristics that are not present in other
schemes (Jin et al., 2003; Yaar et al., 2003). First,
it can maintain high accuracy (i.e. low false
negative ratio and low false positive ratio) even
when under a sophisticated DDoS attack (Details
will be presented in Section New attacking technique.). Second, it can differentiate Internet paths
in which the last 8 or 16 routers are identical.
Third, the proposed scheme works well even when
attackers are near the victim (in terms of number
of hops) and conventional schemes cannot work
well. According to the experiment results, ANTID
can identify 99.95% spoofed packets. Experiment
results also indicate that the higher an aggregated
attack rate is, the sooner the attack can be
detected.
574
Note that ANTID is designed to defend against
DDoS attacks which mainly consisted of spoofed
packets. Other types of DDoS attacks, such as
Distributed Reflector DoS (DRDoS) is out of the
scope of this paper. In a DRDoS attack, the attack
packets sent to the victim server are generally not
spoofed and can be handled by conventional
schemes. In this case, DRDoS victim will not
directly benefit from ANTID. However, since the
packets for triggering a DRDoS attack (the packets
delivered to the reflectors) are generally spoofed,
our approach can detect the spoofed packets, and
make it very difficult for attackers to collect
a sufficiently large number of reflectors. In other
words, with a wide deployment of our scheme, the
DRDoS attack can also be hampered.
The paper is organized as follows. Section
Related work reviews the conventional DDoS defense mechanisms. Section New attacking technique presents a new attack that can circumvent
conventional DDoS defense schemes. Section Proposed scheme presents the details of the proposed
path fingerprint scheme. Section Robustness
against circumvention analyzes the robustness of
our approach against attacks. Section Evaluation
presents experimental results and this paper concludes with the last section.
Related work
Many DDoS defense mechanisms have been presented in the literature recently. These schemes
can be roughly categorized into four classes:
attacker-end based, network-based, victim-end
based, and hybrid. The attacker-end based approaches (Li et al., 2001; Mirkovic et al., 2002)
attempt to identify DDoS attack traffic or spoofed
IP packets at attack sources. Once DDoS attack
traffic or spoofed packets are detected, proactive
filtering mechanisms are activated to stop attack
traffic from entering the Internet. Although these
approaches can effectively reduce network congestions caused by attack traffic, their effectiveness of defending against DDoS attacks heavily
depends on the wide deployment on the Internet.
Moreover, the lack of incentive for installing defense mechanisms at sources and the shortage of
incremental deployment property will weaken the
feasibility of these approaches in large networks,
such as the Internet.
The network-based approaches count on Internet routers to defend against DDoS attacks in
a cooperative manner. Schemes in this category
perform either the traceback of the attack traffic
or complex filtering operations on routers. IP
575
the same path will share an identical path identifier. With this scheme, the path identifier of
a single identified attack packet will provide the
victim the ability to filter subsequent attack
packets with the same path identifier. However,
the motivation of using this approach is unclear.
Since the victim is capable of detecting a single
attack packet, the reason for not using the same
detecting facility to detect subsequent attack
packets is not mentioned. Moreover, consider that
packets traversed the same last 8 routers before
they enter the Autonomous System (AS) at which
the victim resides, the victim will not be able to
distinguish these packets since their path identifiers are identical (in the case of each router marks
two bits in the Identification field). As a result, IP
packets of legitimate clients that traverse the
same last 8 routers with attack packets will be
discarded. Furthermore, consider a special case
where the number of participating routers between an attack and the victim is smaller then 8.
The attack can partially pollute the attack mark
list, which represents the marks of attack packets.
It is because, in this case, some bits in the
Identification field are under the control of the
attacker and remain unmarked throughout the path.
This may result in mis-classifying a large portion
of legitimate packets as attack ones. Finally, this
scheme cannot handle DDoS attacks originated
from the AS in which the victim resides, since
the marking operation is suppressed on routers in
the AS.
576
S
(1)
A
R1
R2
Internet
(2)
R3
V
(a)
(b)
Figure 2 (a) An example of determining the default gateway of an IP address being spoofed, and (b) an example of
enumerating the list of routers between a spoofed source and the victim.
Proposed scheme
In this section, we propose a new spoofed packet
filtering anti-DDoS scheme, called ANTID. In this
scheme, each IP packet is embedded with a unique
path fingerprint representing the route an IP
packet has traversed, and IP packets with incorrect path fingerprints is considered spoofed. The
proposed scheme eliminates some weaknesses of
conventional schemes, and is designed specifically
for defending against spoofed DDoS attacks. It
intends to complement, rather than replace existing schemes.
The basic of ANTID is the validation of an IP
packet via its source IP address and the path
fingerprint embedded in it. In this section, the
computation of a path fingerprint is first described,
and then the inspection algorithm for identifying
spoofed IP packets is presented. Next, an efficient
approach for constructing a table that contains the
mappings of IP addresses and their path fingerprints is proposed. Finally, the details of detecting
a spoofed DDoS attack are shown, and subsequent
packet filtering operations are examined.
577
the receiving router sets the pf-flag bit to 1, sets
the distance field to 1 and sets the path identification field to the random number associated with
the incoming interface of the packet. On the other
hand, if the flag bit is already on, i.e. 1, the
receiving router increments the distance field by
one, and updates the path identification field with
H(PID, Ni), where PID represents the current value
of path identification field in the packet, Ni
denotes the random number of the incoming
interface, and H is a one-way hash function with
weak collision resistance. (Note that H is not
a secret and each participating router can choose
its hash function.) Algorithm 1 shows the pseudocode for computing path fingerprint on a participating router, and Fig. 3 illustrates an example of
the path fingerprinting scenario.
In the example depicted in Fig. 3, a packet
traverses from the source S to the destination D
across routers R1eR4. The first router in the path,
R1, sets both pf-flag and distance filed to 1 and
sets the initial PID value to the random number of
the incoming interface, i.e. N1. Afterwards, each
router increases the distance field and updates the
PID field according to the previous PID value and
the random number of the current incoming interface. In this figure, H denotes a hash function.
To allocate space from the IP packet header for
storing a path fingerprint, the 16-bit Identification
field in the IP header is chosen to be overloaded.
Issues related to the overloading of this field has
been studied and reported (Savage et al., 2000). In
this paper, the 16-bit Identification field is divided
into two sub-fields. The first sub-field is 5-bit long
and is used to store the value of distance. It is
believed that 5 bits are sufficient (Carter and
Crovella, 1997; Theilmann and Rothermel, 2000)
since most of Internet paths are shorter than 31
578
e
nc
sta g
di -fla
pf
N1
R1
N2
R2
PI
R3
R4
1 4 PID4
1 4 PID4
N4
H
1 1 PID1
Figure 3
1 2 PID2
1 3 PID3
Algorithm 2
N3
in the S2PF table, the algorithm returns UNKNOWN. Otherwise, the algorithm compares the
two path fingerprints. (One from the IP packet and
the other from the S2PF table.) If they are
identical, the algorithm returns LEGITIMATE, or
else, it returns SPOOFED.
Notice that the inspecting algorithm only determines whether a given IP packet is spoofed or
not. Weeding out spoofed packet is not performed
by ANTID alone. This is because the inspecting
algorithm may mis-classify legitimate packets as
spoofed ones when an out-of-date S2PF table is in
use. (A S2PF table will become out-of-date when
there are topological changes in the Internet, or
a participating router re-assigns random numbers
to its network interfaces.) To avoid errors caused
by an obsolete S2PF table, spoofed packets will
only be discarded after a DDoS attack signal is
caught by ANTID.
579
detection algorithm presented in Algorithm 2
returns UNKNOWN, and an exploration process will
be invoked at probability q, where 0 % q ! 1. In
this way, we can avoid overloading the Internet
and can avoid building a S2PF table containing
a large portion of infrequently contacted clients.
As to the second case, although the majority of
Internet paths are expected to be stable and
remain unchanged for a long period of time (Jin
et al., 2003; Paxson, 1997), occasionally it is still
necessary to update the S2PF table when the
routing changes. This update function is important
to maintain an up-to-date S2PF table. In the
proposed scheme, upon receipt of an IP packet
that traversed a new Internet path (assuming that
the S2PF table has an entry for the IP address of
this packet), the spoofed detection algorithm will
classify this packet as spoofed. Then, in this case,
an exploration process will be invoked at probability r, where 0 % r ! 1. Both q and r are used to
prevent our scheme from excessively exploring
path fingerprints by ICMP echo-request/echo-reply
messages, and at the same time, we preserve the
ability to insert and update entries in the S2PF
table.
Since a S2PF table cannot accommodate the
mappings of all possible IP addresses (there can be
at most 232 entries), replacing an old S2PF table
entry with a new one is also an important issue
that needs to be addressed. Whenever a replacement is needed, we currently recommend that
several cache replacement techniques, such as
Least Frequently Used (LFU), Least Recently Used
(LRU) and Most Frequently Used (MFU), can be
used. However, in this paper, we do not make
definitive claim that which replacement technique
is the best for the S2PF table entry replacement,
and determining the best replacement policy
warrants further research.
Finally, in ANTID, the number of spoofed packets received is used as a criterion to determine the
onset of a spoofed DDoS attack. Thus, in the
monitor mode, whenever an exploration process
is invoked owing to receipt of a new IP address, the
returned path fingerprint is compared with the
path fingerprint stored in the IP packet. If they are
not identical, a counter spoofing-cnt, which records the number of spoofed packet received in
one unit of time, will be increased by one.
Similarly, whenever the inspecting algorithm returns SPOOFED, the spoofing-cnt is also incremented by one unless the exploration process
returns an path fingerprint identical to the one in
the IP packet. Algorithm 3 shows the pseudo-code
for the construction and update of the S2PF table
in the monitor mode.
580
Algorithm 3
S2PF table
finally arrive at the victim along with path fingerprints consistent with the spoofed IP addresses.
In the following, we examine two types of
approaches to achieve this objective.
Simple attack: The simplest approach is to set
random initial values in both the path fingerprint field and the source IP address field.
Notice that an attacker cannot seed the
fingerprint field of attack packets in such
a way that the fingerprint of the attack packets
will arrive at the victim server along with
a correct path fingerprint. This is because the
value in the path fingerprint field will be
changed securely. Without knowing all the
random numbers associated with the traversed
links, the attacker has no knowledge of the
correct seed. In other words, since the random
numbers associated with network links are kept
securely, it is very difficult for an attacker to
control path fingerprint received by the victim.
Thus, the best an attacker can do is to set
random seed in the fingerprint field and the
source IP field. However, this approach is
infeasible since it is very unlikely that the
randomly spoofed source IP address will exist in
the S2PF table at the destination host or that
these attack packets can arrive at the destination along with a correct path fingerprint.
The probability for a match is 1/2(d C n) (in our
Algorithm 5
1:
2:
3:
4:
5:
6:
581
scheme, (d C n) Z 16). Next, consider a more
sophisticated case where an attacker can
carefully select a spoofed IP address and can
set an appropriate value in the distance field
(setting an appropriate initial value in the
distance field can be achieved by using the
technique presented in Section New attacking
technique). In this case, only very few attack
packets can pass the spoofed packet detection.
It is because that the best an attacker can do is
to fill the path identification field with a random value and only then the fraction 1/2n (in
our scheme, n Z 11) of attack packets can
arrive at the destination along with a correct
path identification value. In short, such a simple attack is not useful to dodge the proposed
scheme.
Detour attack: As we have shown in Section
New attacking technique, an attacker can
determine the default gateway of a spoofed
IP address. Thus it is reasonable to assume
that an attacker can force attack packets to
traverse the default gateway of the spoofed IP
address by using IP SOURCEROUTE option. In
this way, the postfix of the attack path will be
identical to the path from the spoofed source
to the victim. This type of attack is referred
to as detour attack. The success of a detour
attack relies on the following mandatory
conditions: there must not exist any participating router in the path from the attacker to
the spoofed IP address (including the default
gateway of the spoofed source). If this
condition holds, an attacker can successfully
conduct a spoofed DDoS attack by using the
detour technique presented here. In this case,
the victim cannot identify spoofed attack
packets since the path fingerprints of these
packets are correct. Although this type of
attack allows an attacker to dodge path
fingerprint filtering, finding an appropriate
spoofed source is very difficult if the participating routers are widely distributed over the
entire Internet. Moreover, the victim can
easily stop attack packets of a detour attack
by filtering IP packets with IP SOURCEROUTE
option set.
According to the above analysis, we can find
that both the simple attack and the detour attack
are ineffective. Furthermore, from a probability
point of view, in the simple attack, attack packets
can bypass the spoofed packet detection at probability of 1/211 (later on we will confirm this by
experiments). In summary, the proposed scheme is
robust against circumvention.
582
Evaluation
In this section, we evaluate the accuracy of the
proposed scheme in the identification and filter of
spoofed packets under DDoS attacks. We simulate
the aggregate of DDoS attack traffic at different
attack rates and then present the performance
metrics that we measure.
Figure 4
The distribution of: (a) number of intermediate routers, and (b) the value of path identifications.
583
and Oliver, 2000; Moore et al., 2001). In the
following, we will present experiments on how
many packets are needed for our scheme to detect
the presence of a DDoS attack, and please notice
that the sensitivity presented here highly depends
on the settings of configuration variables. Fig. 6
shows the number of rounds required to detect the
presence of a spoofed DDoS attack under three
attack rates: 50,000, 100,000 and 150,000 attack
packets per round. This figure shows that the
number of rounds needed to detect a spoofed
DDoS attack decreases as the attack rate increases. Next, we conduct the same experiments
at lower attack rates. In these experiments, we
send 5000, 10,000, 15,000, ., 50,000 attack
packets to the victim at each round. We observed
the growth of the S2PF table and the number of
rounds needed to detected attacks. The experimental result is shown in Table 1. According to the
table, we can find that the higher the attack rate
is, the fewer rounds and the fewer entries in the
S2PF table are required to detect the presence of
an attack.
In summary, the experimental results show
that a higher attack rate will result in a smaller
number of rounds required to detect an ongoing
spoofed DDoS attack. After the attack is detected, only a very small fraction (around 1/
2048) of attack packets can pass the spoofed
packet detection mechanism. This shows that our
approach can effectively detect the presence of
an attack and subsequently can weed out these
attack packets.
584
Figure 6
The false negative ratio under the attack rates of 50,000, 100,000 and 150,000 attack packets per round.
Table 1
attack
traffic. The higher the attack rate is, the short the
time for detecting will be. Finally, our approach
possesses several important properties, such as
strong incremental deployment and lightweight for
marking, decoding and filtering. No cooperation
among ISP networks is needed. More importantly,
it is robust against sophisticated DDoS attacks, and
it is resistant to the deception by nearby attackers. These properties make the proposed scheme
a general and robust approach that is feasible to
be deployed in the Internet. There are several
issues that require further investigations. For instance, a systematic way for configuring parameters, q, r, T1 and T2, for a specific network
environment is required. And, an efficient approach for maintaining the S2PF table is needed.
Finally, the best strategy for deploying participating routers in the Internet needs to be designed
and investigated.
At different attack rates, the number of rounds and the number of table entries required to detect the
Attack rate
Table size
Number of rounds
5000
11,937
3156
10,000
5928
621
15,000
3983
259
20,000
2990
136
25,000
2462
88
30,000
2037
52
35,000
1750
37
40,000
1517
27
45,000
1378
20
50,000
1243
16
References
Belenky A, Ansari N. IP traceback with deterministic packet
marking. IEEE Communications Letters April 2003;7(2):
162e4.
Bellovin S, Leech M, Taylor T. ICMP traceback messages [Online].
Available from: http://www.ietf.org/internet-drafts/draftietf-itrace-04.txt; Feb. 2003.
Carter RL, Crovella ME. Server selection using dynamic path
characterization in wide-area networks. In: Proceedings of
the IEEE INFOCOM; Apr. 1997. p. 1014e21.
CERT Coordination Center. CERTR incident note IN-99-07 distributed denial of service tools [Online]. Available from: http://
www.cert.org/incident_notes/IN-99-07.html; Jan. 1999a.
CERT Coordination Center. Results of the distributed-systems
intruder tools workshop [Online]. Available from: http://
www.cert.org/reports/dsit-workshop-final.html
http://
www.cert.org/reports/dsit-workshop.pdf; Nov. 1999.
CERT Coordination Center. CERTR advisory CA-1999-17 denialof-service tools [Online]. Available from: http://www.cert.
org/advisories/CA-1999-17.html; Dec. 1999.
CERT Coordination Center. CERTR advisory CA-2000-01 denial-of-service developments [Online]. Available from: http://
www.cert.org/advisories/CA-2000-01.html; Jan. 2000.
Cheswick B, Burch H, Branigan S. Mapping and visualizing the
internet. In: Proceedings of USENIX annual technical
conference [Online]. Available from: http://www.usenix.
org/publications/library/proceedings/usenix2000/general/
cheswick.html; June 2000.
Darmohray T, Oliver R. Hot spares for DoS attacks;login
[Online]. Available from: http://www.usenix.org/publications/
login/2000-7/apropos.html; July 2000.
Dean D, Franklin M, Stubblefield, A. An algebraic approach to
IP traceback. ACM Transactions on Information and System
Security May 2002;5(2):119e37.
Dittrich D. The DoS projects trinoo distributed denial of service
attack tool [Online]. Available from: http://staff.washington.
edu/dittrich/misc/trinoo.analysis; Oct. 1999a.
Dittrich D. The tribe flood network distributed denial of
service attack tool [Online]. Available from: http://staff.
washington.edu/dittrich/misc/tfn.analysis; Oct. 1999b.
Ferguson P, Senie D. Network ingress filtering: defeating denial
of service attacks which employ IP source address spoofing.
Internet engineering task force, RFC 2827 [Online]. Available from: http://www.rfc-editor.org/rfc/rfc2827.txt; May
2000.
Ioannidis J, Bellovin SM. Implementing pushback: router-based
defense against DDoS attacks. In: Proceedings of network and
distributed system security conference. p. 79e86 [Online].
Available from: http://www.isoc.org/isoc/conferences/ndss/
02/proceedings/papers/ioanni.pdf; Feb. 2002.
Jin C, Wang H, Shin KG. Hop-count filtering: an effective
defense against spoofed ddos traffic. In: Proceedings of ACM
conference on computer and communications security; Oct.
2003. p. 30e41.
Jung J, Krishnamurthy B, Rabinovich M. Flash crowds and denial
of service attacks: characterization and implications for
CDNs and web sites. In: Proceedings of IEEE international
world wide web conference; May 2002. p. 252e62.
Keromytis AD, Misra V, Rubenstein D. SOS: secure overlay
services. In: Proceedings of the 2002 ACM conference on
applications, technologies, architectures, and protocols for
computer communications; Aug. 2002. p. 61e72.
Keromytis AD, Misra V, Rubenstein D. SOS: an architecture for
mitigating DDoS attacks. IEEE Journal on Selected Areas in
Communications Jan. 2004;22(1):176e88.
585
Kung HT, Bradner S, Tan K-S. An IP-layer anonymizing infrastructure. In: Proceedings of MILCOM, vol. 1; Oct. 2002.
p. 389e94.
Kung HT, Cheng C-M, Tan K-S, Bradner S. Design and analysis of
an IP-layer anonymizing infrastructure. In: Proceedings of
the third DARPA information survivability conference and
exposition, vol. 1; Apr. 2003. p. 62e75.
Li J, Mirkovic J, Wang M, Reiher P, Zhang L. Save: source address
validity enforcement protocol. In: Proceedings of IEEE
INFOCOM, vol. 3; June 2001. p. 1157e566.
Mahajan R, Bellovin SM, Floyd S, Ioannidis J, Paxson V,
Shenker S. Controlling high bandwidth aggregates in the
network. ACM Computer Communications Review July 2002;
32(3):62e73.
Mirkovic J, Prier G, Reiher P. Attacking DDoS at the source. In:
Proceedings of international conference on network protocols; Nov. 2002. p. 312e21.
Moore D, Voelker G, Savage S. Inferring internet denial of
service activity. In: Proceedings of USENIX security symposium [Online]. Available from: http://www.usenix.org/
events/sec01/moore.html; Aug. 2001.
Paxson V. End-to-end routing behavior in the internet.
IEEE/ACM Transactions on Networking Oct. 1997;5(5):
601e15.
Peng T, Leckie C, Ramamohanarao K. Detecting distributed
denial of service attacks using source IP address monitoring. Australia: The University of Melboume; 2002. Tech. rep
[Online]. Available from: http://www.ee.mu.oz.au/pgrad/
taop/research/detection.pdf.
Peng T, Leckie C, Ramamohanarao K. Protection from distributed denial of service attacks using history-based IP
filtering. In: Proceedings of IEEE international conference
on communications, vol. 1; May 2003. p. 482e6.
Sanchez LA, Milliken WC, Snoeren AC, Tchakountio F, Jones CE,
Kent ST, et al. Hardware support for a hash-based IP
traceback. In: Proceedings of the second DARPA information
survivability conference; June 2001. p. 146e52.
Savage S, Wetherall D, Karlin AR, Anderson T. Practical network
support for IP traceback. In: Proceedings of SIGCOMM
conference; Aug. 2000. p. 295e306.
Savage S, Wetherall D, Karlin AR, Anderson T. Network support
for IP traceback. IEEE/ACM Transactions on Networking June
2001;3:226e37.
Snoeren AC, Partridge C, Sanchez LA, Jones CE, Tchakountio F,
Kent ST, et al. Hash-based IP traceback. In: Proceedings of
the ACM SIGCOMM conference; Aug. 2001. p. 3e14.
Snoeren AC, Partridge C, Sanchez LA, Jones CE, Tchakountio F,
Schwartz B, et al. Single-packet IP traceback. IEEE/ACM
Transactions on Networking 2002;10(6):721e34.
Song D, Perrig A. Advanced and authenticated marking schemes
for IP traceback. In: Proceedings of IEEE INFOCOM conference; Apr. 2001. p. 878e86.
Sung M, Xu J. IP traceback-based intelligent packet filtering:
a novel technique for defending against internet DDoS
attacks. In: Proceedings of international conference on
network protocols; Nov. 2002. p. 302e11.
Sung M, Xu J. IP traceback-based intelligent packet filtering:
a novel technique for defending against internet DDoS
attacks. IEEE Transactions on Parallel and Distributed
Systems Sep. 2003;14(9):861e72.
Theilmann W, Rothermel K. Dynamic distance maps of the
internet. In: Proceedings of the IEEE INFOCOM, vol. 1; Mar.
2000. p. 275e84.
Yaar A, Perrig A, Song D. Pi: a path identification mechanism to
defend against DDos attacks. In: Proceedings of the
IEEE symposium on security and privacy; May 2003.
p. 93e109.
586
Shiuhpyng Shieh is a Professor and former Chairman of
Department of Computer Science and Information Engineering of
National Chiao Tung University. He is also the president of Chinese
Cryptology and Information Security Association (CCISA), which is
the largest and a highly respectable academic organization on
information security research in Taiwan. He has worked as advisor
to many institutes, such as National Security Bureau, GSN-CERT/
CC, National Information and Communication Security Task
Force. Before joining NCTU, Dr. Shieh participated in the design
and implementation of the B2 Secure XENIX at IBM, Federal Sector
Division, Gaithersburg, Maryland. He also designed and developed NetSphinx, a network security product, for Formosoft
Inc., which is awarded 1999 network product of the year, Taiwan.
Dr. Shieh received the M.S. and Ph.D. degrees in electrical and
computer engineering from the University of Maryland, College
Park. He is a senior member of IEEE, and an editor of ACM
Transactions on Information and System Security, Journal of