IP Traceback through Modified Probabilistic Packet Marking Algorithm Y. Bhavani Dept of Information Technology KITS Warangal, AP yerram.bh@gmail.com Dr. V. Janaki Dept of Computer Science Vaagdevi College of Engineering Warangal, AP janakicse@yahoo.com Dr. R. Sridevi Dept of Computer Science JNTUH Hyderabad, AP sridevirangu@yahoo.com AbstractDenial of service (DOS) attack is one of the most common attacks on the internet. The most difficult part of this attack is to find the source of the denial of service (DOS) attack. Savage et al. proposed PPM algorithm to traceback the route to the attacker. We found two disadvantages of the Savage traceback technique. The first disadvantage is probability of finding of far away routers is very less which results in losing some of the routers identity. This affects the attack graph construction. The second disadvantage is, because of re-marking of the edges the constructed graph contain new edges which do not exist in attack graph. In this paper, we propose a modified probabilistic packet marking (MPPM) IP traceback methodology and we found that the results are quite interesting when compared with the approach proposed by Savage. Keywords— DOS attack, IP traceback, indicator, far away routers, Modified Probabilistic Packet marking. I. INTRODUCTION Denial of service (DOS) attack is a pressing problem on the internet. As the name suggests, a denial of service attack is one that denies certain services from being able to be accessed by the legitimate users. Though this problem originated years ago no profound solutions have been proposed, as this attack is easy to detect but difficult to prevent, because the only hint the victim has is the source address, which can easily be forged. Hence, the only solution is to find the entire attack path (from victim to source). The attack path consists of the various routers identity through which the packets travelled along with the source and victim’s address. One of the solutions to deal with DOS attacks is IP traceback which gives the route from the victim to the attacker[2][3][5][8][12] which is a complicated procedure. Once the probable source of the malicious traffic has been identified, system administrator immediately takes the preventive measure to get rid of the attacker. The attack path can be traced from the received packets. To construct this, packets should contain information regarding the routers through which they have travelled. Hence, there should be some methodology to store the individual router’s identity in the packet which can be obtained by a procedure called Marking. There are two techniques for the marking procedure. 1. Deterministic Packet Marking procedure [4]. 2. Probabilistic Packet Marking procedure [2][3][5][8]. This paper deals with the second procedure i.e. Probabilistic Packet Marking. The probabilistic packet marking (PPM) algorithm proposed by Savage et al. [2] has thrown an idea of IP traceback. In this algorithm the packets are marked probabilistically depending upon a threshold marking probability value P m at every router and all these marked packets are collected by the victim to construct the attack path[2][3]. In this approach it is observed that the marked information contained in the packets will be overwritten by the subsequent routers, which leads to wrong marking (new edges) and have a low chance of receiving the identification of far away routers. Here we present a modified probabilistic packet marking algorithm (MPPM). In this technique the router overhead is same as that of the PPM proposed by Savage et al.[2], nevertheless our algorithm is much more accurate in marking the fields of the packets and efficient in construction of attack graph. The structure of this paper is organized as follows. The probabilistic packet marking (PPM) approach is explained in section 2. Section 3 introduces the Modified Probabilistic Packet Marking Algorithm (MPPM). Section 4 explains the Graph reconstruction procedure. Section 5 the Experimentation results. Section 6 compares the PPM and MPPM and Section 7 concludes the paper. II. PROBABILISTIC PACKET MARKING ALGORITHM The Probabilistic Packet Marking (PPM) algorithm was originally suggested by Burch and Cheswick [1]. Later it was designed and implemented by Savage et al. [2] to solve the IP trace back problem. It consists of two levels: Packet marking procedure and Graph reconstruction procedure. In the packet marking procedure, when a router receives a packet, a random number will be generated and the packets will be marked by comparing it with the threshold value P m which is a predefined value. At the victim, graph reconstruction procedure uses these marked packets to construct the graph. The constructed graph is the graph obtained by the PPM algorithm and attack graph is the path the attack packets have traversed. The constructed graph should be the same as the 978-1-4799-2827-9/13/$31.00 ©2013 IEEE