A Coding-Based Incremental Traceback Scheme against DDoS Attacks in MANET


Due to constrained resources, DDoS attack is one of the biggest threats to MANET. IP traceback technique is useful to defend against such type of attacks, since it can identify the attack sources. Several types of traceback schemes have been proposed for wired networks. Among all the existing schemes, probabilistic packet marking (PPM) scheme might be the most promising scheme for MANET. However its performance in MANET is not as good as that in Internet. In this paper, a new scheme based on the codingtechnique (CT) is proposed for traceback in MANET. Furthermore, a new idea of Incremental traceback is raised to cope with the situation of incremental attack (ICT). We present the protocol design and conduct theoretical analysis of this scheme. Additionally, we conduct experiments to compare it with the traditional PPM scheme. The experimental results show that the new coding-based traceback scheme outperforms the PPM scheme in MANET.

Share and Cite:

Jing, Y. , Jiang, Q. , Xiao, X. and Wang, X. (2013) A Coding-Based Incremental Traceback Scheme against DDoS Attacks in MANET. Communications and Network, 5, 478-484. doi: 10.4236/cn.2013.53B2088.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] H. Yang, H. Y. Luo, F. Ye, S. W. Lu and L. X. Zhang, “Security in Mobile Ad Hoc Networks,” IEEE Wireless Communications Challenges and Solutions, Vol. 11, No. 1, 2004, pp. 38-47. http://dx.doi.org/10.1109/MWC.2004.1269716
[2] D. Moore, G. Voelker and S. Savage, “Inferring Internet Denial-of-Service Activity,” 10th ACM USENIX Security Symposium, 2002, pp. 9-22.
[3] I. Aad, J. P. Hubaux and E. Knightly, “Impact of Denial of Service Attacks on Ad Hoc Networks,” IEEE/ACM Transactions on Net-working, Vol. 16, No. 4, 2008, pp. 791-802. http://dx.doi.org/10.1109/TNET.2007.904002
[4] Y. Jing, X. Wang, X. Xiao and G. Zhang, “Defending Against Meek DDoS Attacks By IP Traceback-based Rate Limiting,” 49th GLOBECOM 2006, San Francisco, November 2006.
[5] A. Belenky and N. Ansari, “On IP Traceback,” IEEE Communications Magazine, Vol. 41, No. 7, 2003, pp. 142-153. http://dx.doi.org/10.1109/MCOM.2003.1215651
[6] Y. Jing, X. Wang, L. Zhang and G. Zhang, “Stable Topology Support for Tracing DDoS Attackers in MANET,” 54th GLOBECOM 2011, Houston, December 2011.
[7] R. Ahlawede, N. Cai, S. R. Li and R. W. Yeung, “Network Information Flow,” IEEE Transactions on Information Theory, 2000.
[8] Wikipedia. Gaussian Elimination. http://en.wikipedia.org/wiki/Gaussian_elimination
[9] S. Savage, D. Wetherall, A. Karlin and T. Anderson, “Practical Network Support for IP Traceback,” ACM SIGCOMM Computer Communication Review, Vol. 30, No. 4, 2000, pp. 295-306. http://dx.doi.org/10.1145/347057.347560
[10] GloMoSim Simulator. http://pcl.cs.ucla.edu/projects/glomosim/ography
[11] S. Bellovin, M. Leech and T. Taylor, “ICMP Traceback Messages,” 2001. http://www3.ietf.org/proceedings/01dec/I-D/draft-ietf-itrace-01.txt
[12] R. Stone, “CenterTrack: An IP Overlay Network for Tracking DoS Floods,” Proceedings of the 2000 USENIX Security Symposium, Denver, CO, July 2000.
[13] A. C.Snoeren, C. Partridge, L. A. Sanchez and C. E. Jones, “Hash-Based IP Traceback,” Proceedings of the 2001 Conference of Applications, Technologies, Architectures, and Protocols for Computer Communications, August 2001, pp. 3-14.
[14] V. L. L. Thing and H. C. J. Lee, “IP Traceback for Wireless Ad-Hoc Networks,” 60th IEEE Vehicular Technology Conference, Los Angeles, September 2004.
[15] Y. Huang and W. Lee, “Hotspot-Based Traceback for Mobile Ad Hoc Networks,” Proceedings of the ACM Workshop on Wireless Security, 2005.
[16] D. Sy and L. Bao, “CAPTRA: Coordinated Packet Traceback,” Proceedings of the 5th International Conference on Information Processing in Sensor Networks, April 2006, pp. 124-135.
[17] I.-Y. Kim and K.-C. Kim, “A Resource-Efficient IP Traceback Technique for Mobile Ad-hoc Networks Based on Time-tagged Bloom Filter,” International Conference on Convergence and Hybrid Information Technology, 2008, pp. 549-554.
[18] Y. Kim and A. Helmy, “SWAT: Small World-Based Attacker Traceback in Ad-hoc Networks,” Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous System: Networking and Services, San Diego, July 2005.
[19] B.-C. Cheng, H. Chen and R.-Y. Tseng, “A Packet Marking with Fair Probability Distribution Function for Minimizing the Convergence Time in Wireless Sensor Networks,” Computer Communications, Vol. 31, No. 18, 2008, pp. 4352-4359. http://dx.doi.org/10.1016/j.comcom.2008.03.024
[20] B.-C. Cheng, H. Chen and G.-T. Liao, “FBT: An Efficient Traceback Scheme in Hierarchical Wireless Sensor Network”, Security and Communication Networks, Vol. 2, No. 2, 2009, pp.133-144. http://dx.doi.org/10.1002/sec.88
[21] X. Jin, Y. X. Zhang, Y. Pan and Y. Z. Zhou, “ZSBT: A Novel Algorithm for Tracing DOS Attackers in MANETS,” EURASIP Journal on Wireless Communications and Networking, Vol. 2006, pp. 1-9.
[22] M.-H. Yang, C.-S. Chiu and S. Shieh, “Tracing Mobile Attackers in Wireless Ad-Hoc Network,” ICIW 2008, pp. 7-12.
[23] A. K. Das, S. Agrawal and S. Vishwanath, “Algebraic Traceback for Dynamic Networks,” 2009.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.