191 Hits in 4.2 sec

Survey on Cloud Based IP Traceback Authentication Framework

Aswathy T, Misha Ravi
2018 International Journal Of Engineering And Computer Science  
A time limited token based authentication framework for authenticating traceback service queries is implemented.  ...  IP traceback is used to find network traffic attack. Origin of IP packet is not authenticated. So source of IP address is not trusted.  ...  These traceback schemes are used in intra and inter autonomous system. Cloud based IP traceback simplify the traceback procedure.  ... 
doi:10.18535/ijecs/v7i3.10 fatcat:23jbq4hohngm5dpbvqakc52ni4

Performance Analysis of ACO-based IP Traceback

Jose Anand, K. Sivachandar
2012 International Journal of Computer Applications  
The ACO-based IP traceback approach uses flow level information to identify the origin of a DDoS attack.  ...  The ACO-based IP traceback method is implemented using NS-2 simulation on various network scenarios consisting of 8 nodes, 10 nodes, and 14 nodes.  ...  Chao et al [3] studied the effectiveness of log-based IP traceback in tracing a single packet under the environment where not all the Autonomous Systems (AS) supports logbased IP traceback.  ... 
doi:10.5120/9509-3895 fatcat:5vcozni6rbauziqfbe3xyajtea


2004 Journal of Interconnection Networks (JOIN)  
We furthermore, provide a scheme to prevent compromised routers from forging markings.  ...  Previous solutions for this problem try to traceback to the exact origin of the attack by requiring every router's participation.  ...  Authenticated Autonomous System Traceback 13 Marking scheme prevents a compromised router from forging the markings of an ASBR.  ... 
doi:10.1142/s0219265904001076 fatcat:77bk5ypjsbg33hrdcv7zspjkk4

Analysis of Various IP Traceback Techniques - A Survey

K. ArunKumar, K. Sai Ashritha
2013 International Journal of Computer Applications  
IP Traceback may be a important ability for chararcteristics sources of attacks and Starting protection measures for the Internet.  ...  IP traceback could also be a name given to any methodology for reliably determining the origin of a packet on the net.  ...  During this methodology it supports traceback of enormous packet flows for extended periods of your time in an exceedingly fashion the same as probabilistic marking schemes instead of discarding packet  ... 
doi:10.5120/13542-1172 fatcat:u4p7q6ua6fhilc3udmzvnk3agq

A Flow-Based Traceback Scheme on an AS-Level Overlay Network

Hongcheng Tian, Jun Bi, Peiyao Xiao
2012 2012 32nd International Conference on Distributed Computing Systems Workshops  
In this paper, we present a flow-based traceback scheme on an AS-level overlay network (EasyTrace).  ...  IP traceback can be used to find the origins and paths of attacking traffic. However, so far, no Internet-level IP traceback system has ever been deployed because of deployment difficulties.  ...  Logging-based schemes for IP traceback Existing logging-based schemes can be sub-categorized as three types depending on whether a scheme is packetlevel, flow-level or source & destination-level.  ... 
doi:10.1109/icdcsw.2012.49 dblp:conf/icdcsw/TianBX12 fatcat:jnelz42lv5hgragyfpj5f5iq5u

Network domain entrypoint/path determination for DDoS attacks

Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay
2008 NOMS 2008 - 2008 IEEE Network Operations and Management Symposium  
Our algorithm is simple and efficient, allowing for a fast traceback and the method is scalable due to the distribution of processing workload.  ...  A method to determine entry points and paths of DDoS attack traffic flows into network domains is proposed.  ...  The standardization of the format for IP marking also becomes an issue.  ... 
doi:10.1109/noms.2008.4575117 dblp:conf/noms/ThingSD08 fatcat:uvfejdmcb5dqpo33dygxajtsha


N.Sri Lakshmi .
2013 International Journal of Research in Engineering and Technology  
In existing work a whole new hybrid IP traceback scheme with efficient packet logging reaching to tend to have a fixed storage requirement for each router ( CAIDA's data set) in packet logging without  ...  IP traceback is amongst the main challenges that face the security of today's Internet.  ...  Kim et al. propose a path signature (PS)-based victim-end defense system. The system requires all routers to flip selected bits in the IP identification field for all incoming packets.  ... 
doi:10.15623/ijret.2013.0208013 fatcat:icivmcczhnb5tock4q6skpyuau

An enhanced Deterministic Flow Marking technique to efficiently support detection of network spoofing attacks

Dang Van Tuyen, Thu Huong Truong, Nguyen Tai Hung, Bart Puype, Didier Colle, Kris Steenhaut, Nguyen Huu Thanh
2014 2014 International Conference on Advanced Technologies for Communications (ATC 2014)  
Many schemes of packet marking IP traceback have been proposed, but still have nevertheless some drawbacks such as low traceback rate, heavy computational overhead due to high-required number of marked  ...  In this paper, we proposed PLA DFM, a novel efficient enhanced solution of Deterministic Flow Marking based on adaptation with real traffic characteristics.  ...  ACKNOWLEDGMENT This work is supported by the PhD Program in HUST, Vietnam as well as the Lotus Project within the Framework of the Erasmus Mundus Action 2 for Mr.Tuyen's research exchange to Vrije Universiteit  ... 
doi:10.1109/atc.2014.7043429 fatcat:dpuioiqwfjdsxn5zqybbvrqw2i

Development of Internet Protocol Traceback Scheme for Detection of Denial-of-Service Attack

O.W. Salami, I.J. Umoh, E.A. Adedokun
2019 Nigerian Journal of Technological Development  
To mitigate the challenges that Flash Event (FE) poses to IP-Traceback techniques, this paper presents an IP Traceback scheme for detecting the source of a DoS attack based on Shark Smell Optimization  ...  SSOA-DoSTBK was compared with a number of IP Traceback schemes for DoS attack source detection in terms of their ability to discriminate FE traffics from attack traffics and the detection of the source  ...  Nature inspired algorithm based on modified Ant Colony System algorithm called ACS-IPTBK (Wang et al., 2016) , has been used for an IP traceback scheme that can detect attack path with a minimum number  ... 
doi:10.4314/njtd.v16i4.3 fatcat:yxvlshy3xvfhpjjc3gzssqrrni

Locating network domain entry and exit point/path for DDoS attack traffic

Vrizlynn L. Thing, Morris Sloman, Naranker Dulay
2009 IEEE Transactions on Network and Service Management  
The victim is also relieved from the traceback task during an attack. The scheme is simple and efficient, allowing for a fast traceback, and scalable due to the distribution of processing workload.  ...  We consider deployment issues and show results from simulations to prove the feasibility of our scheme. We then implement our Traceback mechanism in C++ and more realistic experiments are conducted.  ...  We would also like to thank Emulab for providing the facility for the experiments.  ... 
doi:10.1109/tnsm.2009.03.090303 fatcat:ln7alfcjrrgklbqszhf6r5f2mi

Traceback of DOS Over Autonomous Systems

Mohammed Alenezi, Martin J Reed
2013 International journal of network security and its applications  
This paper proposes two new efficient autonomous system (AS) traceback techniques to identify the AS of the attacker by probabilistically marking the packets.  ...  However, in a network with multiple hops through a number of autonomous systems (AS), as is common with most Internet services, it may be undesirable for every router to contribute to packet marking or  ...  Dynamic probabilistic packet marking for efficient IP traceback (DPPM) [10] is another form of PPM as it marks the packet based on probability.  ... 
doi:10.5121/ijnsa.2013.5211 fatcat:vzgizlzidrdprllomw4j2s65oe

On Evaluating IP Traceback Schemes: A Practical Perspective

Vahid Aghaei-Foroushani, A. Nur Zincir-Heywood
2013 2013 IEEE Security and Privacy Workshops  
This paper presents an evaluation of two promising schemes for tracing cyber-attacks, the well-known Deterministic Packet Marking, DPM, and a novel marking scheme for IP traceback, Deterministic Flow Marking  ...  This evaluation is based on CAIDA Internet traces October 2012 dataset.  ...  [13] present two new IP marking techniques to solve the IP traceback problem: The Advanced Marking Scheme and the Authenticated Marking Scheme.  ... 
doi:10.1109/spw.2013.13 dblp:conf/sp/ForoushaniZ13 fatcat:4drr3p32bfbrzauh4qu67764uu

Tracing cyber attacks from the practical perspective

Zhiqiang Gao, N. Ansari
2005 IEEE Communications Magazine  
HASH-BASED IP TRACEBACK Basic Scheme -Hash-based IP traceback (also called SPIE) was proposed by Snoeren et al. [5] .  ...  Problem 4 may not be easily resolved in the IP layer. However, it is possible for a router to know the value of d at the Autonomous System (AS) level.  ... 
doi:10.1109/mcom.2005.1453433 fatcat:sey4mrcslva6lkxxf43ays6n3e

IP traceback through (authenticated) deterministic flow marking: an empirical evaluation

Vahid Aghaei-Foroushani, A Nur Zincir-Heywood
2013 EURASIP Journal on Information Security  
In this paper, we present a novel approach to IP traceback -deterministic flow marking (DFM). We evaluate this novel approach against two well-known IP traceback schemes.  ...  These are the probabilistic packet marking (PPM) and the deterministic packet marking (DPM) techniques.  ...  Song [13] has proposed an advanced and authenticated marking scheme for IP traceback.  ... 
doi:10.1186/1687-417x-2013-5 fatcat:fpzodzbzk5a7jfpax4ne5nuewq

The Improvement Scheme Based on SIPT

Jie Ying Lao, Zhi Lei Sun
2013 Applied Mechanics and Materials  
Speedy IP Traceback method (SIPT) is deficient in monitoring and position attack sources, this paper puts forward an improvement scheme based on SIPT, it only marks two-three times for the packet on the  ...  key locations, and the propose also overload rarely used fields on IP packet header to store the checkpoint information, which can traceback the attack source use these marking information, which would  ...  The improvement scheme based on SIPT of marking technology SIPT method of the marking technology inserts the attacker identification information in IP packet header, the improvement scheme based on SIPT  ... 
doi:10.4028/ fatcat:xkfgti7xejbyvcauuoghbfp4du
« Previous Showing results 1 — 15 out of 191 results