Filters








304 Hits in 3.6 sec

Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT [chapter]

Brian Cusack, Zhuang Tian, Ar Kar Kyaw
2017 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
In this theoretical research, IP traceback methods are compared and evaluated for application, and then consolidated into a set of metrics for potential use against attackers. attack making it more difficult  ...  IP traceback is to find the origin of malicious attacking packets [10] .  ...  Afterwards, we propose evaluation metrics for IP traceback methods (Section 4), which is followed by the conclusion and future work (Section 5).  ... 
doi:10.1007/978-3-319-52727-7_14 fatcat:cgqvxh6nwnbyhgnxzxiwoez2xq

On IPv6 traceback

S.O. Amin, Choong Seon Hong
2006 2006 8th International Conference Advanced Communication Technology  
So We also examined the issues regarding IPv6 header and far all of the research regarding IP traceback has been targeted show that this scheme is practical, scalable, efficient and towards ipv4 networks  ...  The motivation of IP traceback is to identify the but not all routers have the resources necessary to examine the true source of an IP datagram in internet.  ...  The major support tracing attack flows.  ... 
doi:10.1109/icact.2006.206422 fatcat:vzndk22lpfch5nxodxiyzr5uve

A Hybrid Approach To Address Ip Traceback Problem Using Nature Inspired Algorithm

Amrita Saini, C. Ramakrishna, Sachin Kumar
2017 Zenodo  
IP Traceback is a proactive and effective approach to detect the origin of the DoS attack and mitigating it with the co-operation of ISP's.  ...  Internet has always been vulnerable to security threats. With the growth in usage of Internet, rate of cyber crime has also increased tremendously.  ...  IP traceback.  ... 
doi:10.5281/zenodo.1130620 fatcat:qdy67olrl5d55fvamsmfwxiz4y

On IP traceback

A. Belenky, N. Ansari
2003 IEEE Communications Magazine  
Several US federal laws that are relevant to traceback were not written with computer networking in mind.  ...  Currently, an insufficient number of court cases and precedents make it difficult to understand all implications of the traceback.  ...  ACKNOWLEDGMENTS This work has been supported in part by the New Jersey Commission on Higher Education via the NJI-TOWER project, and the New Jersey Commission on Science and Technology via the NJ Wireless  ... 
doi:10.1109/mcom.2003.1215651 fatcat:dn37cckwvja6vmaxecafdazacu

IPv6 Packet Traceback: A Survey

Rajesh KumarSingh, Sumit Pundir, Emmanuel S. Pilli
2013 International Journal of Computer Applications  
In this paper we survey various traceback techniques for IPv6 after introducing the same for IPv4.  ...  We also analyze the differences between packet header fields of IPv4 and v6 and list the challenges for IPv6 traceback.  ...  SPIE is a log-based traceback system that uses efficient auditing techniques at network routers to support the traceback of individual IP packets.  ... 
doi:10.5120/12971-0139 fatcat:fcoqq4olpbf5bpw7cmxs225nsu

On Evaluating IP Traceback Schemes: A Practical Perspective

Vahid Aghaei-Foroushani, A. Nur Zincir-Heywood
2013 2013 IEEE Security and Privacy Workshops  
This paper presents an evaluation of two promising schemes for tracing cyber-attacks, the well-known Deterministic Packet Marking, DPM, and a novel marking scheme for IP traceback, Deterministic Flow Marking  ...  ACKNOWLEDGMENT This research is supported by the Natural Science and Engineering Research Council of Canada (NSERC) grant, and is conducted as part of the Dalhousie NIMS Lab at http://projects.cs.dal.ca  ...  Future work will explore how to embed an IP traceback scheme such as DFM into existing security systems and frameworks. a) NI-ID table: For every edge router interface and in case of existence of VLANs  ... 
doi:10.1109/spw.2013.13 dblp:conf/sp/ForoushaniZ13 fatcat:4drr3p32bfbrzauh4qu67764uu

Interest Flooding Attack Countermeasures Assessment on Content Centric Networking

Matteo Virgilio, Guido Marchetto, Riccardo Sisto
2015 2015 12th International Conference on Information Technology - New Generations  
We run different simulation campaigns in a real deployment scenario to support our evaluation. Content Centric Networking, interest flooding attack, security, DoS, simulation I.  ...  Content Centric Networking (CCN) has introduced new concepts and ideas in the next generation routing protocols research area, proposing an alternative approach to the well known and consolidated TCP/IP  ...  INTEREST FLOODING ATTACK In traditional IP networks, DDoS attacks usually plague end terminals since the connection information state is kept by these devices.  ... 
doi:10.1109/itng.2015.122 fatcat:nfltqsmjhfghtdrxpqshiigiee

A Survey on DDoS Attack and Defense Strategies: From Traditional Schemes to Current Techniques

Muhammad AAMIR, Mustafa Ali ZAIDI
2013 Interdisciplinary Information Sciences  
On the other hand, in reflector attacks, zombies send request packets with spoofed IP (IP of the victim) in source address field to a number of other compromised machines (PCs, routers etc.) and the reply  ...  We also discuss some traditional methods of defense such as traceback and packet filtering techniques, so that readers can identify major differences between traditional and current techniques of defense  ...  The proposed metrics are further combined with the algorithm of IP traceback to produce a collaborative technique of defense against low-rate DDoS attacks.  ... 
doi:10.4036/iis.2013.173 fatcat:pgvcutvfajejpmgatezon5ftdq

HDSL: A Hybrid Distributed Single-packet Low-storage IP Traceback Framework. (Dept. E)

Magdy M. Fadel
2021 MEJ Mansoura Engineering Journal  
The attackers rely on the fact that Internet routing infrastructure is mainly concerned by scalability rather security, since routers neither validate source IP address nor log information regarding the  ...  These simulations will measure important DDoS defense metrics concerning packet logging overhead, traceback procedure overhead, and traceback accuracy.  ...  Security There are two main security problems, the first is spoofing the source IP address of the packet by the attacker, hence the Intrusion Detection System (IDS) could not filter out the packets based  ... 
doi:10.21608/bfemu.2021.211300 fatcat:pbf275r5tvhovextpgb2b5hnhm

Tracing cyber attacks from the practical perspective

Zhiqiang Gao, N. Ansari
2005 IEEE Communications Magazine  
Clearly, the current IP traceback technology is only the first step toward tackling DoS/DDoS attacks. An ideal tracing scheme has to make trade-offs among various factors.  ...  EVALUATION METRICS A number of metrics may be used to evaluate the performance of disparate traceback schemes, such as the minimum number of marked packets required for path reconstruction, processing  ... 
doi:10.1109/mcom.2005.1453433 fatcat:sey4mrcslva6lkxxf43ays6n3e

IP traceback through (authenticated) deterministic flow marking: an empirical evaluation

Vahid Aghaei-Foroushani, A Nur Zincir-Heywood
2013 EURASIP Journal on Information Security  
In this paper, we present a novel approach to IP traceback -deterministic flow marking (DFM). We evaluate this novel approach against two well-known IP traceback schemes.  ...  We have employed 16 performance metrics to evaluate their performances.  ...  Acknowledgements This research is supported by the Natural Science and Engineering Research Council of Canada (NSERC) grant and is conducted as part of the Dalhousie NIMS Lab at http://projects.cs.dal.ca  ... 
doi:10.1186/1687-417x-2013-5 fatcat:fpzodzbzk5a7jfpax4ne5nuewq

A hotspot-based protocol for attack traceback in mobile ad hoc networks

Hungyuan Hsu, Sencun Zhu, Ali Hurson
2010 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security - ASIACCS '10  
after a number of traceback operations.  ...  It works by dividing the forwarding path of every packet into multiple interweaving fragments and each reachable fragment is individually reconstructed during a traceback process.  ...  The existing IP traceback schemes do not work in MANETs because almost all of the IP traceback schemes assume a static network topology. Trust is another key factor.  ... 
doi:10.1145/1755688.1755733 dblp:conf/ccs/HsuZH10 fatcat:cz5rn4wylrfo7nfw3wztz6bvua

Hash-based IP traceback

Alex C. Snoeren
2001 Computer communication review  
We present a hash-based technique for IP traceback that generates audit trails for traffic within the network, and can trace the origin of a single IP packet delivered by the network in the recent past  ...  The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet.  ...  tunneling, and IP security (IPsec).  ... 
doi:10.1145/964723.383060 fatcat:yxaai7vyc5evzlxrcarqfpchfm

Coloring the Internet: IP traceback

M. Muthuprasanna, G. Manimaran, M. Alicherry, V. Kumar
2006 12th International Conference on Parallel and Distributed Systems - (ICPADS'06)  
Several IP Traceback schemes employing packet marking have been proposed to trace DoS/DDoS attacks that use source address spoofing.  ...  Additionally various architectures for traceback have been explored, such as interdomain traceback [18] and hybrid traceback [19], [20].  ...  Thus partial and incremental deployment of traceback schemes can be supported on this overlay infrastructure, implicitly allowing co-existence of both traceback-enabled and nontraceback-enabled routers  ... 
doi:10.1109/icpads.2006.31 dblp:conf/icpads/MuthuprasannaMAK06 fatcat:3ut2jwewzbefveg4wiaa6c6ifq

Hash-based IP traceback

Alex C. Snoeren
2001 Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '01  
We present a hash-based technique for IP traceback that generates audit trails for traffic within the network, and can trace the origin of a single IP packet delivered by the network in the recent past  ...  The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet.  ...  tunneling, and IP security (IPsec).  ... 
doi:10.1145/383059.383060 dblp:conf/sigcomm/Snoeren01 fatcat:f3wf2r4urrb3fdsyfpqggdyffq
« Previous Showing results 1 — 15 out of 304 results