Increasing accuracy and reliability of IP traceback for DDoS attack using completion condition

被引:0
|
作者
Saurabh, Samant [1 ]
Sairam, Ashok Singh [1 ]
机构
[1] Department of Computer Science, Indian Institute of Technology, Patliputra Colony, Patna, Bihar,800013, India
来源
关键词
Network security - Number theory;
D O I
暂无
中图分类号
学科分类号
摘要
Probabilistic Packet Marking (PPM) is one of the most promising schemes for performing IP Traceback. PPM reconstructs the attack graph in order to trace back to the attackers. Finding the Completion Condition Number (i.e. precise number of packets required to complete the traceback) is very important. Without a proper completion-condition, we might reconstruct a wrong attack-graph and attackers can evade detection. One presently being used works only for a single attacker based DoS attack and has an accuracy of just around 70%. We propose a new Completion Condition Number which has an accuracy of 95% and it works even for the multiple attacker based DDoS attacks. We confirm the results using detailed theoretical analysis and extensive simulation work. To the best of our knowledge, we are the first to apply the concept of Completion Condition Number to increase the reliability of IP Traceback for the DDoS attacks.
引用
收藏
页码:224 / 234
相关论文
共 22 条
  • [1] IP Traceback Schemes for DDoS Attack
    Mandhar, Vipul
    Ranga, Virender
    NETWORKING COMMUNICATION AND DATA KNOWLEDGE ENGINEERING, VOL 1, 2018, 3 : 37 - 50
  • [2] IP traceback algorithm for DoS/DDoS attack
    Yim, Hong-bin
    Jung, Jae-il
    MANAGEMENT OF CONVERGENCE NETWORKS AND SERVICES, PROCEEDINGS, 2006, 4238 : 558 - 561
  • [3] A method of IP traceback against DDoS attack
    Institute of Computer, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
    不详
    Jisuanji Gongcheng, 2006, 8 (181-182+231):
  • [4] Research on IP Traceback Technology Based on DDoS Attack
    Tian Zhuo
    Li Baicheng
    MODERN TECHNOLOGIES IN MATERIALS, MECHANICS AND INTELLIGENT SYSTEMS, 2014, 1049 : 1820 - 1823
  • [5] UDP based IP Traceback for Flooding DDoS Attack
    Murugesan, Vijayalakshmi
    Selvaraj, MercyShalinie
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (01) : 103 - 111
  • [6] A novel protocol for IP traceback to detect DDoS attack
    Meena, Yogesh Kumar
    Trivedi, Aditya
    International Journal of Computer Science Issues, 2012, 9 (4 4-1): : 284 - 291
  • [7] Identification of the Real Source of DDOS Attack by FDPM in IP Traceback System
    Barokar, Gaurav D.
    Mahalle, V. S.
    UKSIM-AMSS EIGHTH EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS 2014), 2014, : 392 - 396
  • [8] A study of defense DDoS attacks using IP Traceback
    Chae, Cheol-Joo
    Lee, Seoung-Hyeon
    Lee, Jae-Seung
    Lee, Jae-Kwang
    2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 402 - +
  • [9] Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT
    Cusack, Brian
    Tian, Zhuang
    Kyaw, Ar Kar
    INTEROPERABILITY, SAFETY AND SECURITY IN IOT, 2017, 190 : 127 - 138
  • [10] Spanning tree search model to traceback DDoS attack using netflow
    Lee, M
    Jung, S
    Kwon, Y
    Kim, K
    Moon, J
    Byeon, O
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 330 - 333