
 
Step 4. Server system denies the flow of packets 
that are forwarded to victim system. 
Step 5. Server System analyzes traceback packet 
included in iTrace message that are received 
from Agent system and begin traceback. First, 
Server system check validate of iTrace Message 
using secrete key(k
n
) 
Step 6. Server system chose iTrace that have 
maximum Timestamp. And Server system store 
RouterID, Backward Link, Forward Link. 
Step 7. Find iTrace Message that have Forward 
connect to Forward Link and establish traceback 
path. 
Step 8. Repeate step 6, step 7 until do not 
connect to iTrace Message. 
Step 9. Server System make complete traceback 
path. Traceback attack source. 
Figure 9 shows result of IP traceback. In figure 
10, we sure do not cause much traffic than PPM 
packet of basis by way that transmit creating iTrace 
Message about something wrong packet, and also do 
not create traffic that iTrace Message can bear to 
whole network. 
 
[ 공격 근원지 탐색정보]
Source1 IP : 203.247.47.65
Source2 IP : 203.247.47.66
Source3 IP : 203.247.47.67
Source4 IP : 203.247.47.68
Source5 IP : 203.247.47.69
Network : 203.247.47.0
Attack Type1 : TCP SYN flood
Attack Type2 : TCP SYN flood
Attack Type3 : TCP SYN flood
Total Attack Traffic : 356,446/s
[ 공격 근원지 탐색정보]
Source1 IP : 203.247.47.65
Source2 IP : 203.247.47.66
Source3 IP : 203.247.47.67
Source4 IP : 203.247.47.68
Source5 IP : 203.247.47.69
Network : 203.247.47.0
Attack Type1 : TCP SYN flood
Attack Type2 : TCP SYN flood
Attack Type3 : TCP SYN flood
Total Attack Traffic : 356,446/s
[ 공격 피해 시스템 정보]
Victim IP : 211.101.95.59
Attack  Type  :  TCP  SYN f lood
Network : 211.101.95.0
Attack Time(term) : 01:00.18
Total Attack Traffic : 356,446/s
[ 공격 피해 시스템 정보]
Victim IP : 211.101.95.59
Attack  Type  :  TCP  SYN f lood
Network : 211.101.95.0
Attack Time(term) : 01:00.18
Total Attack Traffic : 356,446/s
 
Figure 9: IP Traceback analyzes Attacker and Victim. 
 
Figure 10: Analysis packet traffic. 
4 CONCLUSIONS 
IP Traceback is an important technique to traceback 
attack source address. Many techniques have been 
proposed but all these techniques have a problem 
when applied in internet environment. As, it is not 
easy to load programming module into router, we 
use linux system as the administrator can access 
linux router. We design and implement IP Traceback 
system that uses iTrace message, which can be 
applied in internet environment. We use 
authentication/non-authentication host DB for 
protecting network hosts from attacker and also due 
fall in traffic rate. We use iTrace message (draft-ietf-
itrace-04) that is undergoing advancement due to 
iTrace message’s standardization. Future work is to 
concentrate on how to implement IP Traceback 
system in ubiquitous environment. 
ACKNOWLEDGEMENTS 
This research was supported by the MKE(Ministry 
of Knowledge Economy), Korea, under the ITRC 
(Information Technology Research Center) support 
program supervised by the IITA(Institute of 
Information Technology Assessment)  (IITA-2008-
C1090-0801-0027)". 
REFERENCES 
Chun He, Formal Specifications of Traceback Marking 
Protocols, June 14, 2002. 
Steve Bellovin et al, ICMP Traceback messages, IETF 
Internet Draft  draft-ietf-itrace-04.txt, Feb 2003. 
D. X. Song, A. Perrig, Advanced and Authenticated 
Marking Scheme for IP Traceback, Proc. Infocom 
Vol2, pp 878-886, 2001. 
S. Savage, D. Wetherall, A. karlin, and T. Anderson, 
Network Support for IPTraceback, IEEE/ACM 
transactions on networking, vol. 9, No. 3, June 2001. 
K. Park and H. Lee, On the effectiveness of probabilistic 
packet marking for IP traceback under denial of 
service attack, Proc. IEEE INFOCOM 01 pp 338-347, 
2001. 
Stefan Savage et al, Practical network support for IP 
traceback, ACM SIGCOMM 2000. 
A.C Snoeren, C. Partride, L.A. Sanchez, W.T. Strayer. 
C.E. Jones. F. Tchakountio, and S.T. Kent, Hash-
Based IP Traceback, BBN Technical Memorandum 
No.1284, February 7, 2001. 
Tatsuya Baba, Shigeyuki Matsuda, Tracing Network 
Attacks to Their Sources, IEEE Internet Computing, 
pp. 20-26, March, 2002. 
ICEIS 2008 - International Conference on Enterprise Information Systems
282