ChinaCom2008-Advances in Internet Symposium

Research Article

Improving the Efficiency of DoS Traceback Based on the Enhanced ITrace-CP Method for Mobile Environment

  • @INPROCEEDINGS{10.1109/CHINACOM.2008.4685116,
        author={Hiroshi TSUNODA and Taishi Tochiori and Yuji Waizum and Nei Kato and Yoshiaki NEMOTO},
        title={Improving the Efficiency of DoS Traceback Based on the Enhanced ITrace-CP Method for Mobile Environment},
        proceedings={ChinaCom2008-Advances in Internet Symposium},
        publisher={IEEE},
        proceedings_a={CHINACOM2008-AIS},
        year={2008},
        month={11},
        keywords={},
        doi={10.1109/CHINACOM.2008.4685116}
    }
    
  • Hiroshi TSUNODA
    Taishi Tochiori
    Yuji Waizum
    Nei Kato
    Yoshiaki NEMOTO
    Year: 2008
    Improving the Efficiency of DoS Traceback Based on the Enhanced ITrace-CP Method for Mobile Environment
    CHINACOM2008-AIS
    IEEE
    DOI: 10.1109/CHINACOM.2008.4685116
Hiroshi TSUNODA1,*, Taishi Tochiori1,*, Yuji Waizum2,*, Nei Kato2,*, Yoshiaki NEMOTO2,*
  • 1: †Faculty of Engineering, Tohoku Institute of Technology, Sendai, Japan 982-8577
  • 2: ‡Graduate School of Information Sciences, Tohoku University, Sendai, Japan 980-8579
*Contact email: tsuno@m.ieice.org, tsuno@m.ieice.org, tsuno@m.ieice.org, tsuno@m.ieice.org, tsuno@m.ieice.org

Abstract

Denial of Service (DoS) attacks pose a serious threat to the Internet. Mobile networks, which are expected to develop rapidly over a few years, are also vulnerable to DoS attacks. Although IP traceback is one of the promising countermeasures for DoS attacks, the fact that attackers have the mobility privilege makes the traceback difficult in mobile networks. In this paper we propose the basic concept of the modification technique for the previously proposed enhanced ITrace-CP scheme in order to trace the attack route before the attacker enters another network. The proposed scheme uses Time To Live (TTL) values of packets and is capable of tracing the attacker in a short time. Simulation experiments show that the proposed scheme is more efficient in tracing attackers in a mobile environment than conventional approaches.