A NEW IP TRACEBACK SCHEME TO AVOID LAUNCH ATTACKS?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 3)Publication Date: 2014-03-30
Authors : E.JANSI BHARATHI.R E.PUSHPARAJ;
Page : 79-88
Keywords : New hybrid IP trace back; CAIDA’s; packet logging; packet marking;
Abstract
The Internet has been widely applied in various fields; more and more network security issues emerge and catch people’s attention. However, adversaries often hide themselves by spoofing their own IP addresses and then launch attacks. For this reason, researchers have proposed a lot of trace back schemes to trace the source of these attacks. Some use only one packet in their packet logging schemes to achieve IP tracking. Others combine packet marking with packet logging and therefore create hybrid IP trace back schemes demanding less storage but requiring a longer search. In this paper, we propose a new hybrid IP trace back scheme with efficient packet logging aiming to have a fixed storage requirement for each router (under 320 KB, according to CAIDA’s skitter data set) in packet logging without the need to refresh the logged tracking information and to achieve zero false positive and false negative rates in attack-path reconstruction. In addition, we use a packet’s marking field to censor attack traffic on its upstream routers. Lastly, we simulate and analyze our scheme, in comparison with other related research, in the following aspects: storage requirement, computation, and accuracy.
Other Latest Articles
- MOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS?
- A Mechanism to Adjust the Updated Data and Recovery for School?
- TRUSTED ATOMIC WEB SERVICE TRANSACTION IN CLOUD
- Data Services For E-Tailers Leveraging Web Search Engine Assets- A Review?
- ENTITY SEARCH ENGINES?
Last modified: 2014-03-12 20:05:00