Research Article

A Low-Overhead and High-Precision Attack Traceback Scheme with Combination Bloom Filters

Table 1

Comprehensive comparative analysis of attack traceback techniques.

CategoryTypical technologiesStorage overheadComputing overheadISP cooperationFalse positive ratioFalse negative ratioTraceback time

Link testingIngress filteringLowLowCollaborativeHighLowLong
Logging-based schemesSPIEHighLowCollaborativeLowLowMiddle
Packet marking methodsPPMLowHighNoncollaborativeHighLowLong
ICMP-based technologiesiTraceLowLowCollaborativeHighHighLong
Overlay network for IP tracebackCenterTrackHighLowCollaborativeLowLowShort
Compounded IP tracebackHPSIPTLowLowCollaborativeLowLowMiddle
SDN-based logging traceability techniquesSDN tracerouteHighLowCollaborativeMiddleMiddleMiddle
SDN-based logging traceability techniquesSDN selective logging methodMiddleLowCollaborativeMiddleMiddleMiddle
SDN-based traceability techniquesSMITELowMiddleCollaborativeLowMiddleMiddle
SD-WAN scenarios traceback schemesCross-domain traceback schemeLowMiddleCollaborativeLowLowMiddle