Link-Layer Traceback In Ethernet Networks

2007 15TH IEEE WORKSHOP ON LOCAL & METROPOLITAN AREA NETWORKS(2007)

引用 10|浏览13
暂无评分
摘要
The design of the most commonly-used Internet and Local Area Network protocols provide no way of verifying the sender of a packet is who it claims to be. A malicious host can easily launch an attack while pretending to be another host to avoid being discovered. To determine the identity of an attacker, an administrator can use traceback, a technique that determines the path of attack packets from the victim to the coordinator. Most traceback research has focused on IP and Stepping-Stone techniques and little has been conducted on the problem of Data-Link Layer Traceback (DLT), the process of tracing frames from the network edge to the attack source. We propose a scheme called Tagged-fRAme tracebaCK (TRACK) that provides a secure, reliable DLT technique for Ethernet networks. TRACK defines processes for Ethernet switches and a centralized storage and lookup host. Simulation results indicate that TRACK provides accurate DLT operation while causing minimal impact on network and application performance.
更多
查看译文
关键词
IP networks,Internet,local area networks,routing protocols,DLT operation,Ethernet network,Ethernet switches,IP traceback,Internet,centralized storage,data-link-layer traceback,local area network protocols,stepping-stone techniques,tagged-frame traceback,
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要