Filters








300 Hits in 3.0 sec

Non-intrusive IP traceback for DDoS attacks

Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay
2007 Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07  
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiting network routers.  ...  Precise information regarding the attack is not required allowing a wide variety of DDoS attack detection techniques to be used.  ...  Based on this rationale, we propose a Non-Intrusive IP traceback scheme.  ... 
doi:10.1145/1229285.1229331 dblp:conf/ccs/ThingSD07 fatcat:tu6tecg2nrbmforqdirfwujdsi

Distributed Denial of Service (DDoS) Attacks and Defence Mechanism

Akhil K.M, Rahul C.T, Athira V.B
2021 International journal of computer science and mobile computing  
The goal of the paper is to set a certain order of existence methods of attack and defense mechanisms, for the better understanding DDoS attacks can be achieved with more effective methods and means of  ...  This paper outlines the problem of DDoS attacks and developing a classification of DDoS attacks and DDoS defense mechanisms.  ...  and include the traceback data in IP packets.  ... 
doi:10.47760/ijcsmc.2021.v10i03.010 fatcat:hi3mznjyqbfi3bgr2c4jxytz2m

Adaptive response system for distributed denial-of-service attacks

Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay
2009 2009 IFIP/IEEE International Symposium on Integrated Network Management  
Experiments on DARE show that the attack detection and mitigation were successfully completed within seconds, with about 60% to 86% of the attack traffic being dropped, while availability for legitimate  ...  attacks.  ...  The Non Intrusive IP Traceback, and the Enhanced TCP SYN Attack Detector and Bloom-based Filter have also been submitted to the Tan Kah Kee Young Inventors Award Competition (under review).  ... 
doi:10.1109/inm.2009.5188887 dblp:conf/im/ThingSD09 fatcat:snsnw7mrangqrhlvbniorqorkq

Locating network domain entry and exit point/path for DDoS attack traffic

Vrizlynn L. Thing, Morris Sloman, Naranker Dulay
2009 IEEE Transactions on Network and Service Management  
Compared to existing techniques, our approach is non-intrusive, not requiring any changes to the Internet routers and data packets.  ...  Precise information regarding the attack is not required allowing a wide variety of DDoS attack detection techniques to be used. The victim is also relieved from the traceback task during an attack.  ...  We would also like to thank Emulab for providing the facility for the experiments.  ... 
doi:10.1109/tnsm.2009.03.090303 fatcat:ln7alfcjrrgklbqszhf6r5f2mi

Network domain entrypoint/path determination for DDoS attacks

Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay
2008 NOMS 2008 - 2008 IEEE Network Operations and Management Symposium  
Our approach is non-intrusive, not requiring any changes to the Internet routers and data packets.  ...  Precise information regarding the attack is not required allowing a wide variety of DDoS attack detection techniques to be used. The victim is also relieved from the traceback task during an attack.  ...  In contrast, our approach provides a means for performing traceback in a non-intrusive way. Changes to the Internet routers are not required.  ... 
doi:10.1109/noms.2008.4575117 dblp:conf/noms/ThingSD08 fatcat:uvfejdmcb5dqpo33dygxajtsha

Intrusion Detection with CUSUM for TCP-Based DDoS [chapter]

Fang-Yie Leu, Wei-Jie Yang
2005 Lecture Notes in Computer Science  
DDoS(Distributed Denial of Service) is the most troublesome attack nowadays, especially for those people whose operational environment relies on network services and/or the Internet.  ...  In this paper, we propose an Intrusion Detection System (IDS), named CUSUM Intrusion Detection System (CIDS), which invokes CUSUM as its detection algorithm and logically divides Internet into many autonomous  ...  Defending with Autonomous NMU CIDS is originally deployed as the detection component of Intrusion Forecast and Traceback System (IFTS) [15] which integrates intrusion detection and traceback and provides  ... 
doi:10.1007/11596042_127 fatcat:t7b4byu73rduzenyny6ky6xjsa

DDoS attacks and defense mechanisms: classification and state-of-the-art

Christos Douligeris, Aikaterini Mitrokotsa
2004 Computer Networks  
This paper presents a structural approach to the DDoS problem by developing a classification of DDoS attacks and DDoS defense mechanisms.  ...  Of particular concern are Distributed Denial of Service (DDoS) attacks, whose impact can be proportionally severe.  ...  IP Traceback Intrusion Response Misuse Detection Anomaly Detection Intrusion Detection Disabling IP Broadcasts Applying Security Patches Route-Based Distributed Packet Filtering Egress Filtering  ... 
doi:10.1016/j.comnet.2003.10.003 fatcat:j5bmatgznraqxcnclv326qr7my

AN IMPROVED IP TRACEBACK MECHANISM FOR NETWORK SECURITY

N.Sri Lakshmi .
2013 International Journal of Research in Engineering and Technology  
Source IP spoofing attacks are critical issues to the Internet. These attacks are considered to be sent from bot infected hosts. There has been active research on IP traceback technologies.  ...  IP traceback is amongst the main challenges that face the security of today's Internet.  ...  proposals for IP traceback mechanism has problems with various drawbacks like need for thousands of packets for performing traceback and the in-ability to handle highly distributed and scaled DDoS attacks  ... 
doi:10.15623/ijret.2013.0208013 fatcat:icivmcczhnb5tock4q6skpyuau

HDSL: A Hybrid Distributed Single-packet Low-storage IP Traceback Framework. (Dept. E)

Magdy M. Fadel
2021 MEJ Mansoura Engineering Journal  
DDoS attack methods could be classified according to the number of attacking packets into flooding and vulnerability attack [2, 3].  ...  I-INTRODUCTION here is no doubt that many DDoS attacks have been reported daily all over the world, these attacks aim to hinder legitimate users from accessing a corporation services or resources, resulting  ...  HDSL Many problems with IP protocol design facilitate the mission of the Distributed Denial of Service (DDoS) attackers.  ... 
doi:10.21608/bfemu.2021.211300 fatcat:pbf275r5tvhovextpgb2b5hnhm

Mitigate DDoS attacks in NDN by interest traceback

Huichen Dai, Yi Wang, Jindou Fan, Bin Liu
2013 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)  
We propose Interest traceback as a counter measure against the studied NDN DDoS attacks, which traces back to the originator of the attacking Interest packets.  ...  Evaluation results reveal that the Interest traceback method effectively mitigates the NDN DDoS attacks studied in this paper.  ...  [6] presents a Non-Intrusive IP traceback scheme which learns valid source addresses transiting network routers from sampled traffic under non-attack conditions for anomaly detection.  ... 
doi:10.1109/infcomw.2013.6970722 fatcat:2ohgevh6gnbn3dlqjhgbb5xgxy

A Peer-to-Peer Architecture to collaboratively Propagate and Traceback DDoS Attack information using DST

D. Thamizh Selvam, P.S. Vinayagam, P. Syam Kumar, Dr. R. Subramanian
2010 International Journal of Computer Applications  
However, the existing detection techniques for DDoS attacks have their entities work in isolation.  ...  Intrusion detection and filtering are necessary mechanisms to combat against these attacks and secure networks.  ...  Current DDoS solutions are many, ranging from host-based solutions to network and infrastructure solutions. Our architecture is basically proposed for DoS detection and IP traceback solutions.  ... 
doi:10.5120/899-1274 fatcat:bcomuoec5zetpfnqzr3ktksq2e

Overview of Traceback Mechanisms and Their Applicability

Heung-Youl YOUM
2011 IEICE transactions on information and systems  
The traceback mechanism is a useful tool to identify the attack source of the (DDoS) attack, which ultimately leads to preventing against the DDoS attack.  ...  As an increasing number of businesses and services depend on the Internet, protecting them against DDoS (Distributed Denial of Service) attacks becomes a critical issue.  ...  One of the challenges for preventing against DDoS attacks is that attackers mostly use spoofed source IP addresses (hereafter referred to as spoofed IP addresses) which make it difficult for network administrators  ... 
doi:10.1587/transinf.e94.d.2077 fatcat:xae4zpuyzfgixipx5ttc2avlqq

Realtime Network IP Traceback Mechanism Against DDOS Attacks
English

Sailakshmi Samudrala, S D Vara Prasad
2014 International Journal of Computer & Organization Trends  
Source IP spoofing attacks are critical issues to the Internet.There has been active research on IP traceback technologies.  ...  Migration of DDOS attack is one the biggest challenge on the internet and lan networks.  ...  and scaled DDoS attacks.  ... 
doi:10.14445/22492593/ijcot-v8p309 fatcat:4kb4thoworgq3dgtetle6cuzwm

Analysis of Various IP Traceback Techniques - A Survey

K. ArunKumar, K. Sai Ashritha
2013 International Journal of Computer Applications  
IP Traceback may be a important ability for chararcteristics sources of attacks and Starting protection measures for the Internet.  ...  As a result, the source address in an IP packet can be fake allowing for Denial Of Service attacks (DoS) or one-way attacks.  ...  [2] discussed a novel traceback method for DDoS attacks, based on entropy variations between normal and DDoS attack traffic, which is different from commonly used packet marking techniques.  ... 
doi:10.5120/13542-1172 fatcat:u4p7q6ua6fhilc3udmzvnk3agq

A Survey on DDoS Attack and Defense Strategies: From Traditional Schemes to Current Techniques

Muhammad AAMIR, Mustafa Ali ZAIDI
2013 Interdisciplinary Information Sciences  
On the other hand, in reflector attacks, zombies send request packets with spoofed IP (IP of the victim) in source address field to a number of other compromised machines (PCs, routers etc.) and the reply  ...  against DDoS attacks.  ...  In normal IP communications, IP address spoofing is an easy task for attacker.  ... 
doi:10.4036/iis.2013.173 fatcat:pgvcutvfajejpmgatezon5ftdq
« Previous Showing results 1 — 15 out of 300 results