..............................
            ..............................
            ..............................
            
STF-DM: A Sparsely Tagged Fragmentation with Dynamic Marking an IP Traceback Approach
        
        Denial  of Service  (DoS)  and  Distributed Denial  of Service  (DDoS)  attacks  are  serious  threats  to  the  Internet.  The 
frequency  of  DoS  and  DDoS  attacks  is  increasing  day  by  day.  Automated  tools  are  also  available  that  enable  non-technical 
people to implement such attacks easily. Hence, it is not only important to prevent such attacks, but also need to trace back the 
attackers.  Tracing  back  the  sources  of  the  attacks,  which  is  known  as  an  IP  traceback  problem  is  a  hard problem  because  of 
the  stateless nature  of the  Internet  and spoofed Internet  Protocol (IP) packets.Various approaches have been proposed for IP 
traceback. Probabilistic Packet Marking (PPM) approach incurs the minimum network and management overhead. Hence, we 
focus  on  PPM  approach.  Sparsely-Tagged  Fragmentation  Marking  Scheme  (S-TFMS),  a  PPM  based  approach,  requires  low 
overhead  at  the  victim  and  achieve  zero  false-positives.  However,  it  requires  a  large  number  of  packets  to  recover  the  IP 
addresses. In this paper, we propose a Sparsely-Tagged Fragmentation Marking approach with dynamic marking probability. 
Our approach requires less number of packets than required by S-TFMS. Further, to reduce the number of packets required by 
victim, we  extend our basic approach with the new marking format.  Our extended approach requires less than one-tenth time 
number  of  packets  than  those  in  S-TFMS  approach  to  recover  the  IP  addresses.  Our  approaches  recover  the  IP  address 
quickly with zero false-positives in the presence of multiple attackers. We show mathematical as well as experimental analysis 
of our approaches.    
            [1] Belenky A. and Ansari N., IP Traceback with Deterministic Packet Marking, IEEE Communications Letters, vol. 7, no. 4, pp. 162- 164, 2003.
[2] Belenky A. and Ansari N., On Deterministic Packet Marking, Computer Networks, vol. 51, no. 10, pp. 2677-2700, 2007.
[3] Bellovin M., Leech M., and Taylor T., ICMP traceback messages, Available: https://tools.ietf.org/html/draft-ietf-itrace-04, Last Visited, 2003.
[4] Burch H. and Cheswick B., Tracing Anonymous Packets to Their Approximate Source, in Proceedings of the 14th USENIX Conference on System Administration, New Orleans, pp. 319- 327, 2000.
[5] Criscuolo P., Distributed Denial of Service: Trinoo, Tribe Flood Network, Tribe Flood Network 2000, and Stacheldraht, Lawrence Livermore National Laboratory, 2000.
[6] Ferguson P., Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing, RFC-2827, 2000.
[7] Gong C. and Sarac K., Toward a More Practical Marking Scheme for IP Traceback, in Proceedings of 3rd International Conference on Broadband Communications, Networks and Systems, San Jose, pp. 1-10, 2006.
[8] Goodrich M., Efficient Packet Marking for Large-Scale IP Traceback, in Proceedings of the 9th ACM Conference on Computer and Communications Security, New York, pp. 117- 126, 2002.
[9] Iwamoto K., Soshi M., and Satoh T., An Efficient and Adaptive IP Traceback Scheme, in Proceedings of IEEE 7th International Conference on Service-Oriented Computing and Applications, Matsue, pp. 235-240, 2014.
[10] Kim K., Hwang, J., Kim B., and Kim S., Tagged Fragment Marking Scheme with Distance- Weighted Sampling for a Fast IP Traceback, in Proceedings of Web Technologies and Applications, Xi an, pp. 442-452, 2003.
[11] Kim K., Kim J., and Hwang J., IP Traceback with Sparsely-Tagged Fragment Marking Scheme under Massively Multiple Attack Paths, Cluster Computing, vol. 16, no. 2, pp. 229-239, 2013.
[12] Korkmaz T., Gong C., Sarac K., and Dykes S., Single Packet IP Traceback in AS-Level Partial Deployment Scenario, International Journal of Security and Networks, vol. 2, no. 1, pp. 95-108, 2007.
[13] Liu J., Lee Z., and Chung Y., Dynamic Probabilistic Packet Marking for Efficient IP Traceback, Computer Networks, vol. 51, no. 3, pp. 866-882, 2007.
[14] Lu N., Wang Y., Su S., and Yang F., A Novel Path Based Approach for Single Packet IP Traceback, Security and Communication Networks, vol. 7, no. 2, pp. 309-321, 2014.
[15] Medina A., Lakhina A., Matta I., and Byers J., BRITE: An Approach to Universal Topology Generation, in Proceedings of 9th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Cincinnati, pp. 346-353, 2001.
[16] Paruchuri V., Durresi A., and Chellappan S., TTL based Packet Marking for IP Traceback, in Proceedings of IEEE GLOBECOM Global Telecommunications Conference, New Orleans, pp. 1-5, 2008.
[17] Sachdeva M., Singh G., Kumar K., and Singh K., DDoS Incidents and Their Impact: A Review, The International Arab Journal of Information Technology, vol. 7, no. 1, pp. 14-20, 2010.
[18] Sattari P., Gjoka M., and Markopoulou A., A Network Coding Approach to IP Traceback, in Proceedings of IEEE International Symposium on Network Coding, Toronto, pp. 1-6, 2010.
[19] Saurabh S. and Sairam A., ICMP Based IP Traceback with Negligible Overhead for Highly Distributed Reflector Attack using Bloom Filters, Computer Communications, vol. 42, pp. 60-69, 2014.
[20] Savage S., Wetherall D., Karlin A., and Anderson T., Practical Network Support for IP Traceback, in Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, Stockholm, pp. 295-306, 2000.
[21] Snoeren A., Partridge C., Sanchez L., Jones C., Tchakountio F., Schwartz B., and Strayer W., Single-Packet IP Traceback, IEEE/ACM Transactions on Networking, vol. 10, no. 6, pp. 721-734, 2002.
[22] Song D. and Perrig A., Advanced and Authenticated Marking Schemes for IP Traceback, in Proceedings of INFOCOM, 20th Annual Joint Conference of the IEEE Computer and Communications Societies, Anchorage, pp. 878-886, 2001.
[23] Stone R., CenterTrack: An IP Overlay Network for Tracking DoS Floods, In USENIX Security Symposium, vol. 21, pp. 114, 2000.
[24] Tian H., Bi J., and Jiang X., An Adaptive Probabilistic Marking Scheme for Fast and 728 The International Arab Journal of Information Technology, Vol. 15, No. 4, July 2018 Secure Traceback, Networking Science, vol. 2, no. 1-2, pp. 42-51, 2013.
[25] Yaar A., Perrig A., and Song D., FIT: Fast Internet Traceback, in Proceedings of INFOCOM, 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Miami, pp. 1395-1406, 2005.
[26] Yan D., Wang Y., Su S., and Yang F., A Precise and Practical IP Traceback Technique Based on Packet Marking and Logging, Journal of Information Science and Engineering, vol. 28, no. 3, pp. 453-470, 2012.
[27] Yang M. and Yang M., RIHT: a Novel Hybrid IP Traceback Scheme, IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 789-797, 2012.
[28] Yang M., Storage-Efficient 16-Bit Hybrid IP Traceback with Single Packet, The Scientific World Journal, vol. 2014, pp. 1-14, 2014. Devesh Jinwala has been working as a Professor in Computer Engineering at the Department of Computer Engineering, S V National Institute of Technology, Surat, India since 1991. His principal research areas of interest are broadly Security, Cryptography, Algorithms and Software Engineering. Specifically his work focuses on Security and Privacy Issues in Resource-constrained environments (Wireless Sensor Networks) and in Data Mining, Attribute-based Encryption techniques, Requirements Specification, and Ontologies in Software Engineering. He has been/is the principal Investigator of several sponsored research projects funded by ISRO, GUJCOST, Govt of Gujarat and DiETY-MCIT-Govt of India. Hasmukh Patel has been working as an Assistant Professor in Computer Engineering Department at Gujarat Power Engineering and Research Institute, Mewad (India). His major areas of interests are security protocols verification and Network Security.
