IP traceback methodology using Markov Chain and Bloom filter in 802.16e

Do Hoon Kim, Hoh Peter In, Byungsik Yoon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Recently, network resource is extremely vulnerable to DDoS attacks which has become a pressing problem due to scarce an efficient method to locate the real attacker. Especially, the more network topology advanced and complex such as 802.16e (WiBro), IP Traceback is difficult. According to, in this paper, the IP Traceback methodology using Markov Chain based on XOR operation is proposed in 802.16e. Also the paper provides a traceback method including: receiving data including access control router infonnation according to a path of an attacker; filtering the data to hash the data, and storing the resultant hashed information; determining whether the data is normally received on the basis of the hashed infonnation; and predicting a path loss on the basis of the determination result. Therefore, it is possible to perform an accurate IP traceback using a probabilistic packing marking method and a hash-based traceback method.

Original languageEnglish
Title of host publicationProceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
Pages454-459
Number of pages6
DOIs
Publication statusPublished - 2008
Event3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 - Busan, Korea, Republic of
Duration: 2008 Nov 112008 Nov 13

Publication series

NameProceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
Volume2

Other

Other3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
Country/TerritoryKorea, Republic of
CityBusan
Period08/11/1108/11/13

ASJC Scopus subject areas

  • Information Systems
  • Software

Fingerprint

Dive into the research topics of 'IP traceback methodology using Markov Chain and Bloom filter in 802.16e'. Together they form a unique fingerprint.

Cite this