HITH: Hybrid IP Traceback for Heterogeneous Wireless Networks

Ikbel Daly, Faouzi Zarai, M. S. Obaidat, K. F. Hsiao


The Denial of Service attack becomes increasingly vulnerable with heterogeneous wireless networks. Thus, it is fundamental to identify the source of attack by the execution of an IP traceback technique. There are two major categories: packet marking and packet logging. The first approach moderates the problem of overhead, but requires a large amount of packets to reconstruct the attack path. In packet logging, saving packets in digest tables enables the identification of attack source through a single packet but necessitates a huge storage space. In this paper, we propose a novel Hybrid IP Traceback for Heterogeneous wireless networks, which is called HITH (Hybrid IP Traceback for Heterogeneous wireless network). Our solution presents a precise IP traceback method with low overhead storage and improved accuracy. Indeed, the mathematical analysis and the comparison with existing solutions prove the capacity to trace a single IP packet while reducing storage overhead and data access time.


  1. Ren, W., Zhao, Q. and Swami, A., “Connectivity of Heterogeneous Wireless Networks”. IEEE Transactions on Information Theory, vol. 57, no. 7, pp. 4315-4332, July 2011.
  2. Houle, K. J. and Weaver, G. M., “Trends in Denial of Service Attack Technology”. Computer Emergency Response Team (CERT) Coordination Center, technical report v1.0, October 2001.
  3. Phatak, D., Sherman, A. T., Joshi, N., Sonawane, B., Relan, V. G., Dawalbhakta, A., “Spread identity: A new dynamic address remapping mechanism for anonymity and DDoS defense”. Journal of Computer Security, vol. 21, no. 2, pp. 233- 281, 2013.
  4. Savage, S., Wetherall, D., Karlin, A. and Anderson, T., “Network Support for IP Traceback”. IEEE/ACM Transactions on Networking (TON), vol. 9, no. 3, pp. 226-237, June 2001.
  5. Bellovin, S. M., “ICMP Traceback Messages”, IETF draft, 2000, http://www.research.att.com/smb/papers/draftbel lovin-itrace-00.txt.
  6. Sager, G., “Security Fun with OCxmon and cflowd”. Internet2 Working Group Meeting, November 1998, http://www.caida.org/funding/ngi/content/security1198.
  7. Choi, K. H. and Dai, H. K., “A marking scheme using Huffman codes for IP traceback”. 7th International Symposium Parallel Architectures, Algorithms Networks (I-SPAN'04), pp. 421-428, Hong Kong, China, May 2004.
  8. Sattari, P., Gjoka, M. and Markopoulou, A., “A network coding approach to IP traceback”. IEEE International Symposium on Network Coding (NetCod'10), pp. 1-6, Toronto, Canada, June 2010.
  9. Yaar, A., Perrig, A. and Song, D., “FIT: Fast internet traceback”. IEEE Conference on Computer Communications (INFOCOM'05), vol. 2, pp. 1395- 1406, March 2005.
  10. Song, D. X. and Perrig, A., “Advanced and Authenticated Marking Schemes for IP Traceback”. IEEE Conference on Computer Communications (INFOCOM'01), vol. 2, pp. 878-886, Arkansas, USA, April 2001.
  11. Fadlallah, A. and Serhrouchni, A., “PSAT: Proactive signaling architecture for IP traceback”. IEEE 4th Annual Communication Networks and Services Research Conference (CNSR'06), pp. 293-299, Washington, DC, USA, May 2006.
  12. Bloom, B. H., “Space/time trade-offs in hash coding with allowable errors”. Communications of ACM, vol. 13, no. 7, pp. 422-426, July 1970.
  13. Yang, M. H. and Yang, M. C., “RIHT: A Novel Hybrid IP Traceback Scheme”. IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 789-797, April 2012.
  14. Sai Priyanka, B. and Srihari Rao, N., “IP Traceback Techniques - A Selective Survey”. International Journal of Computer Science and Mobile Applications, vol. 1, no. 3, pp. 40-44, September 2013.
  15. Gong, Ch. and Sarac, K., “IP Traceback based on Packet Marking and Logging”, IEEE International Conference on Communications (ICC'05), vol. 2, pp. 1043-1047,16-20 May 2005.
  16. Murugesan, V., Shalinie, M., Neethimani, N., “A Brief Survey of IP Traceback Methodologies”. Acta Polytechnica Hungarica, vol. 11, no. 9, pp. 197-216, 2014.
  17. Goodrich, M. T., “Probabilistic Packet Marking for Large Scale IP Traceback”. IEEE/ACM Trans. Networking, vol. 16, no. 1, pp. 15-24, February 2008.
  18. Snoeren, A. C., Partridge, C., Sanchez, L., Jones, C., Tchakountio, F., Schwartz, B., Kent, S. and Strayer, W., “Single-packet IP traceback”. IEEE/ACM Transactions on Networking, vol. 10, no. 6, pp. 721- 734, 2002.
  19. Mölsä, J., “Mitigating denial of service attacks: A tutorial”. Journal of Computer Security, vol. 13, no. 6, pp. 807-837, 2005.
  20. Stoica, I. and Zhang, H., “Providing guaranteed services without per flow management”. ACM conference on Applications, technologies, architectures, and protocols for computer communication (SIGCOMM'99), vol. 29, no. 4, pp. 81-94, Cambridge, MA, USA , October 1999.
  21. Muthuprasanna, M., Manimaran, G., Manzor, M., and Kumar, V., “Coloring the internet: IP Traceback”. 12th International Conference on Parallel and Distributed Systems (ICPADS'06), pp. 589-598, Minneapolis, USA, August 2006.
  22. Dean, D., Franklin, M. and Stubblefield, A., “An algebragic appproach to IP traceback”. ACM Transactions on Information and System Security, vol. 5, no. 2, pp. 119-137, 2002.
  23. Gao, Z. and Ansari, N., “Enhanced probabilistic packet marking for IP traceback”. IEEE Global Telecommunications Conference (GLOBECOM'05), vol. 3, pp. 1676-1680, 28 November - 2 December 2005.
  24. Gong, C. and Sarac, K., “Toward a practical packet marking approach for IP traceback”. International Journal of Network Security, vol. 8, pp. 271-281, 2009.
  25. Yan, D., Wang, Y., Su, S. and Yang, F., “A Precise and Practical IP Traceback Technique Based on Packet Marking and Logging”. Journal of Information Science and Engineering, vol. 28, pp. 453-470, 2012.
  26. Gong, Ch. et Sarac, K., “A More Practical Approach for Single-Packet IP Traceback using Packet Logging and Marking”. IEEE Transactions on Parallel and Distributed System, vol. 19, no. 10, pp. 1310-1324, October 2008.
  27. Broder, A. and Mitzenmacher, M., “Network applications of Bloom filters: A survey”. Internet Mathematics, vol. 1, no. 4, pp. 485-509, 2005.
  28. McCreary, S. and Claffy, K., “Trends in wide area IP traffic patterns: A view from Ames internet exchange”. 13th ITC Specialist Seminar on IP Traffic Modeling, Measurement and Management, pp. 1-25, Monterey, CA, USA, 2000.

Paper Citation

in Harvard Style

Daly I., Zarai F., Obaidat M. and Hsiao K. (2016). HITH: Hybrid IP Traceback for Heterogeneous Wireless Networks . In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 6: WINSYS, (ICETE 2016) ISBN 978-989-758-196-0, pages 84-93. DOI: 10.5220/0006042500840093

in Bibtex Style

author={Ikbel Daly and Faouzi Zarai and M. S. Obaidat and K. F. Hsiao},
title={HITH: Hybrid IP Traceback for Heterogeneous Wireless Networks},
booktitle={Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 6: WINSYS, (ICETE 2016)},

in EndNote Style

JO - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 6: WINSYS, (ICETE 2016)
TI - HITH: Hybrid IP Traceback for Heterogeneous Wireless Networks
SN - 978-989-758-196-0
AU - Daly I.
AU - Zarai F.
AU - Obaidat M.
AU - Hsiao K.
PY - 2016
SP - 84
EP - 93
DO - 10.5220/0006042500840093