Unlock instant, AI-driven research and patent intelligence for your innovation.

Autonomous system-based edge marking (asem) for internet protocol (ip) traceback

An Internet protocol and autonomous system technology, applied in the field of autonomous system-based edge marking (ASEM) for Internet protocol (IP) tracking, can solve the problems of impracticality and low efficiency of the background technology IP tracking scheme

Inactive Publication Date: 2009-08-26
NEW JERSEY INSTITUTE OF TECHNOLOGY
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Background art IP tracing schemes are inefficient and often impractical, at least for the reasons discussed above

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Autonomous system-based edge marking (asem) for internet protocol (ip) traceback
  • Autonomous system-based edge marking (asem) for internet protocol (ip) traceback
  • Autonomous system-based edge marking (asem) for internet protocol (ip) traceback

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] Embodiments include, but are not limited to, Autonomous System Based Edge Marking (ASEM) for Internet Protocol Tracing. On the Internet, an Autonomous System (AS) is a collection of Internet Protocol (IP) networks and routers under the control of one or more entities that provide a common routing policy to the Internet. The Internet Protocol (IP) is a data-oriented protocol for communicating data across a packet-switched Internet network.

[0015] Embodiments of ASEM have been optimized such that the heavy computational burden and high false alarm rate of the background art can be reduced. Additionally, embodiments are more robust to IP spoofing and compromised routers than the background art. The embodiment simplifies the tracking process compared to the background art because: (1) path reconstruction can be completed immediately and correctly with the help of link information; and (2) much fewer packets are needed to locate the source of the attack.

[0016] Embodim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments are directed to an Autonomous System-based Edge Marking (ASEM) for Internet Protocol (IP) traceback. In particular, the embodiments are a system and a method for IP traceback that receives one or more packets at routers; inscribes packets only at marking routers with autonomous system (AS) level and marking information; and forwards the marked packets to edge routers and other routers for verification. Additionally the packets are marked based on a probability measure and Border Gateway Protocol (BGP) routing table information is the AS level information used for marking and verification.

Description

Background technique [0001] The ubiquitous Internet has dramatically changed our way of life. Everyday activities such as online banking, stock trading and teleconferencing are increasingly dependent on the capabilities of the Internet. Cybersecurity for military communications and financial transactions over the Internet is a particular focus. The advent of the deadly Denial of Service (DoS) attack and its advanced variant, the Distributed DoS (DDoS) attack, are troublesome intruders to our use and reliance on the Internet. The detrimental effects of DoS / DDoS attacks have been repeatedly demonstrated even on high-profile sites such as Yahoo, CNN, Ebay, and Amazon. [0002] In particular, DDoS attacks pose a serious threat to network security. In a DDoS attack, the attacker sends a large amount of malicious traffic to the victim. For example, a DDoS attacker can compromise one or more computers in different data centers via computer systems connected to the Internet. Typi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L45/04H04L63/1458H04L45/745H04L45/00H04L2463/146
Inventor 尼尔万·安萨里高志强
Owner NEW JERSEY INSTITUTE OF TECHNOLOGY