WIDE Paper List in 2006 An autonomous architecture for inter-domain traceback across the wide-paper-traceback-hazeyama-iscc200606-00.txt WIDE Project: http://www.wide.ad.jp/ If you have any comments on this document, please contact to ad@wide.ad.jp. ^L Title:An autonomous architecture for inter-domain traceback across the borders of network operation Author(s): Hiroaki Hazeyama (hiroa-ha@naist.jp) Youki Kadobayashi (youki-k@aist-nara.jp) Daisuke Miyamoto (daisu-mi@naist.jp) Masafumi Oe (masa@fumi.org) Date: 2006-12-26 % - 査読ありのコンファレンス・ワークショップ等 @inproceedings{ Hazeyama:ISCC2006, author = "Hiroaki Hazeyama and Youki Kadobayashi and Daisuke Miyamoto and Masafumi Oe", title = "An autonomous architecture for inter-domain traceback across the borders of network operation", booktitle = "Proceedings of IEEE Symposium on Computers and Communications (ISCC'06)", pages = "378--385", month = "June", year = 2006 } %url: %[http://csdl.computer.org/dl/proceedings/iscc/2006/2588/00/258800378.pdf] %x-wide-wgnames: [traceback] %keywords: [traceback, inter-domain, architecture] %references: [http://www.acsac.org/2005/techblitz/hazeyama.pdf] %summary_ja: [] %summary: [ %The difficulties of achieving an inter-domain traceback %architecture come from the issues of overcoming network %operation boundaries, especially the leakage of sensitive %information, the violation of the administrative permission %and the cooperation among Autonomous Systems (ASes). %We have proposed InterTrack in [ACSAC05] as an interconnection %architecture for different traceback systems and other Denial %of Service (DoS) attack countermeasures. In this paper, %we argue that only disclosing AS status to others can reconstruct %the reverse AS path of an attack without the leakage of %sensitive information or the violation of the administrative %permission. Comparing our architecture with other traceback %architectures, we also discuss the feasibility of our autonomous %traceback architecture. %] %misc: []