
Q. JIANG ET AL.
Copyright © 2013 SciRes. CN
6. Conclusion
In this paper, we first an alyze the existing problems when
conducting traceback against DDoS attacks in MANET,
and the problems when we apply PPM scheme to MA-
NET. To achieve the goal of high tracing efficiency, we
proposed a coding-based traceback scheme. We detail
the encoding and decoding procedures of this scheme
and analyze the traceback performance in a theoretical
way. Furthermore, we compare the performance of CT
with PPM and we can see that the performance of CT is
better than PPM in both traceable ratio and convergence
time .
REFERENCES
[1] H. Yang, H. Y. Luo, F. Ye, S. W. Lu and L. X. Zhang,
“Security in Mobile Ad Hoc Networks,” IEEE Wireless
Communications Challenges and Solutions, Vol. 11, No.
1, 2004, pp. 38-47.
http://dx.doi.org/10.1109/MWC.2004.1269716
[2] D. Moore, G. Voelker and S. Savage, “Inferring Internet
Denial-of-Service Activity,” 10th ACM USENIX Security
Symposium, 2002, pp. 9-22.
[3] I. Aad, J. P. Hubaux and E. Knightly, “Impact of Denial
of Service Attacks on Ad Hoc Networks,” IEEE/ACM
Transactions on Networking, Vol. 16, No. 4, 2008, pp.
791-802. http://dx.doi.org/10.1109/TNET.2007.904002
[4] Y. Jing, X. Wang, X. Xiao and G. Zhang, “Defending
Against Meek DDoS Attacks By IP Traceback-based
Rate Limiting,” 49th GLOBECOM 2006, San Francisco,
November 2006.
[5] A. Belenky and N. Ansari, “On IP Traceback,” IEEE
Communications Magazine, Vol. 41, No. 7, 2003, pp.
142-153. http://dx.doi.org/10.1109/MCOM.2003.1215651
[6] Y. Jing, X. Wang, L. Zhang and G. Zhang, “Stable To-
pology Support for Tracing DDoS Attackers in MANET,”
54th GLOBECOM 2011, Houston, December 2011.
[7] R. Ahlawede, N. Cai, S. R. Li and R. W. Yeung, “Net-
work Information Flow,” IEEE Transactions on Informa-
tion Theory, 2000.
[8] Wikipedia. Gaussian Elimination.
http://en.wikipedia.org/wiki/Gaussian_elimination
[9] S. Savage, D. Wetherall, A. Karlin and T. Anderson,
“Practical Network Support for IP Traceback,” ACM
SIGCOMM Computer Communication Review, Vol. 30,
No. 4, 2000, pp. 295-306.
http://dx.doi.org/10.1145/347057.347560
[10] GloMoSim Simulator.
http://pcl.cs.ucla.edu/projects/glomosim/ography
[11] S. Bellovin, M. Leech and T. Taylor, “ICMP Traceback
Messages,” 2001.
http://www3.ietf.org/proceedings/01dec/I-D/draft-ietf-itra
ce-01.txt
[12] R. Stone, “CenterTrack: An IP Overlay Network for
Tracking DoS Floods,” Proceedings of the 2000 USENIX
Security Symposium, Denver, CO, July 2000.
[13] A. C.Snoeren, C. Partridge, L. A. Sanchez and C. E.
Jones, “Hash-Based IP Traceback,” Proceedings of the
2001 Conference of Applications, Technologies, Archi-
tectures, and Protocols for Computer Communications,
August 2001, pp. 3-14.
[14] V. L. L. Thing and H. C. J. Lee, “IP Traceback for Wire-
less Ad-Hoc Networks,” 60th IEEE Vehicular Technolo-
gy Conference, Los Angeles, September 2004.
[15] Y. Huang and W. Lee, “Hotspot-Based Traceback for
Mobile Ad Hoc Networks,” Proceedings of the ACM
Workshop on Wireless Security, 2005.
[16] D. Sy and L. Bao, “CAPTRA: Coordinated Packet Tra-
ceback,” Proceedings of the 5th International Conference
on Information Processing in Sensor Networks, April
2006, pp. 124-135.
[17] I.-Y. Kim and K.-C. Kim, “A Resource-Efficient IP Tra-
ceback Technique for Mobile Ad-hoc Networks Based on
Time-tagged Bloom Filter,” International Conference on
Convergence and Hybrid Information Technology, 2008,
pp. 549-554.
[18] Y. Kim and A. Helmy, “SWAT: Small World-Based
Attacker Traceback in Ad-hoc Networks,” Proceedings of
the 2nd Annual International Conference on Mobile and
Ubiquitous System: Networking and Services, San Diego,
July 2005.
[19] B.-C. Cheng, H. Chen and R.-Y. Tseng, “A Packet
Marking with Fair Probability Distribution Function for
Minimizing the Convergence Time in Wireless Sensor
Networks,” Computer Communications, Vol. 31, No. 18,
2008, pp. 4352-4359.
http://dx.doi.org/10.1016/j.comcom.2008.03.024
[20] B.-C. Cheng, H. Chen and G.-T. Liao, “FBT: An Effi-
cient Traceback Scheme in Hierarchical Wireless Sensor
Network”, Security and Communication Networks, Vol. 2,
No. 2, 2009, pp.133-144. http://dx.doi.org/10.1002/sec.88
[21] X. Jin, Y. X. Zhang, Y. Pan and Y. Z. Zhou, “ZSBT: A
Novel Algorithm for Tracing DOS Attackers in MA-
NETS,” EURASIP Journal on Wireless Communications
and Net- working, Vol. 2006, pp. 1-9.
[22] M.-H. Yang, C.-S. Chiu and S. Shieh, “Tracing Mobile
Attackers in Wire less Ad-Hoc Network,” ICIW 2008, pp.
7-12.
[23] A. K. Das, S. Agrawa l and S. Vishwanath , “Algebraic
Traceback for Dynamic Networks,” 2009.