A Model of IP Traceability Dynamic Collaboration Technology in the Denial of Service Attack

被引:0
|
作者
Li Qingshan [1 ]
机构
[1] Peking Univ, Beijing 100871, Peoples R China
关键词
Denial of Service attack; IP traceability; Dynamic collaboration model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a model of IP traceability Dynamic Collaboration technology in the denial of service attack; analyzes the behavior of using illegal attack means to terminate the service capabilities of the target object in heterogeneous networks; provides a method of network transmission which is capable of dynamically adjusting data packet marking probability and making information to detect the abnormal traffic; and establishes three-layer dynamic collaboration marking architecture: traceability management layer, network proxy layer and network router layer. This paper conduct a confirmatory reconstruction of DoS attack path, and through designing collaboration model algorithm which based on threshold of data packet arrival rate, CPU usage threshold, probabilistic marking probability and dynamic adjustment factor given by collaboration architecture, as well as flexibly using identification, flag and bit offset about IP data packet fragmentation-related fields. The results show that the attack path will be accurately constructed by means of the probabilistic marking and dynamic collaboration, and IP traceability efficiency is over 97% which can achieve the purpose of traceability attack source.
引用
收藏
页码:133 / 136
页数:4
相关论文
共 50 条
  • [1] Simulation of IP traceback for the denial of service attack
    Yamana, M
    Hirata, K
    Shimizu, H
    Nakatani, H
    Kai, T
    Tsukamoto, K
    2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 110 - 113
  • [2] Denial-of-Service attack Possibilities on NFC Technology
    Fahrianto, Feri
    Lubis, Muhammad Fadil
    Fiade, Andrew
    2016 4TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT, 2016, : 228 - 232
  • [3] On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
    Park, K
    Lee, H
    IEEE INFOCOM 2001: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: TWENTY YEARS INTO THE COMMUNICATIONS ODYSSEY, 2001, : 338 - 347
  • [4] IP trace back techniques to ferret out denial of service attack source
    Aijaz, Adnan
    Mohsin, Syed Raza
    Mofassir-Ul-Haque
    PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND PRIVACY (ISP '07): ADVANCED TOPICS IN INFORMATION SECURITY AND PRIVACY, 2007, : 135 - 140
  • [5] Response to distributed denial-of-service attack using active technology
    Kim, HJ
    Na, JC
    Sohn, SW
    Proceedings of the Eighth IASTED International Conference on Internet and Multimedia Systems and Applications, 2004, : 244 - 248
  • [6] A Distributed Denial of Service Attack Sources Detection Technology for Cloud Computing
    Yang, Wenjun
    Wei, Dan
    2017 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2017, : 660 - 664
  • [7] A Novel Model for Distributed Denial of Service Attack Analysis and Interactivity
    Ahmad, Ashraf
    AbuHour, Yousef
    Alghanim, Firas
    SYMMETRY-BASEL, 2021, 13 (12):
  • [8] Development of an Intelligent Classifier Model for Denial of Service Attack Detection
    Michelena, Alvaro
    Aveleira-Mata, Jose
    Jove, Esteban
    Alaiz-Moreton, Hector
    Quintian, Hector
    Calvo-Rolle, Jose Luis
    INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2023, 8 (03): : 33 - 42
  • [9] Analysis of a denial of service attack on TCP
    Schuba, CL
    Krsul, IV
    Kuhn, MG
    Spafford, EH
    Sundaram, A
    Zamboni, D
    1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 208 - 223
  • [10] A survey of Distributed Denial of Service attack
    Mallikarjunan, K. Narasimha
    Muthupriya, K.
    Shalinie, S. Mercy
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,