A Model of IP Traceability Dynamic Collaboration Technology in the Denial of Service Attack

被引:0
|
作者
Li Qingshan [1 ]
机构
[1] Peking Univ, Beijing 100871, Peoples R China
关键词
Denial of Service attack; IP traceability; Dynamic collaboration model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a model of IP traceability Dynamic Collaboration technology in the denial of service attack; analyzes the behavior of using illegal attack means to terminate the service capabilities of the target object in heterogeneous networks; provides a method of network transmission which is capable of dynamically adjusting data packet marking probability and making information to detect the abnormal traffic; and establishes three-layer dynamic collaboration marking architecture: traceability management layer, network proxy layer and network router layer. This paper conduct a confirmatory reconstruction of DoS attack path, and through designing collaboration model algorithm which based on threshold of data packet arrival rate, CPU usage threshold, probabilistic marking probability and dynamic adjustment factor given by collaboration architecture, as well as flexibly using identification, flag and bit offset about IP data packet fragmentation-related fields. The results show that the attack path will be accurately constructed by means of the probabilistic marking and dynamic collaboration, and IP traceability efficiency is over 97% which can achieve the purpose of traceability attack source.
引用
收藏
页码:133 / 136
页数:4
相关论文
共 50 条
  • [21] Denial-of-service attack resilience dynamic group key agreement for heterogeneous networks
    Joseph Chee Ming Teo
    Chik How Tan
    Jim Mee Ng
    Telecommunication Systems, 2007, 35 : 141 - 160
  • [22] A Denial of Service Attack Method for an IoT System
    Liang, Lulu
    Zheng, Kai
    Sheng, Qiankun
    Huang, Xin
    2016 8TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME), 2016, : 360 - 364
  • [23] Denial of Service Attack in Software Defined Network
    Bera, Piu
    Saha, Ankita
    Setua, S. K.
    PROCEEDINGS OF 2016 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2016, : 497 - 501
  • [24] A detection design for distributed denial of service attack
    Fujita, N
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, PROCEEDINGS: INFORMATION SYSTEMS DEVELOPMENT I, 2002, : 78 - 82
  • [25] Distributed Denial of Service: Attack techniques and mitigation
    Vanitha, K. S.
    Uma, S. V.
    Mahidhar, S. K.
    2017 2ND INTERNATIONAL CONFERENCE ON CIRCUITS, CONTROLS, AND COMMUNICATIONS (CCUBE), 2017, : 226 - 231
  • [26] An analysis and fingerprinting of a distributed denial of service attack
    Sung, MH
    Haas, M
    Xu, J
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VIII, PROCEEDINGS: CONCEPTS AND APPLICATIONS OF SYSTEMICS, CYBERNETICS AND INFORMATICS II, 2002, : 274 - 279
  • [27] Denial-of-Service Attack Detection System
    Thakare, Supriya S.
    Kaur, Parminder
    2017 1ST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND INFORMATION MANAGEMENT (ICISIM), 2017, : 281 - 285
  • [28] Denial-of-service attack resilience dynamic group key agreement for heterogeneous networks
    Teo, Joseph Chee Ming
    Tan, Chik How
    Ng, Jim Mee
    TELECOMMUNICATION SYSTEMS, 2007, 35 (3-4) : 141 - 160
  • [29] Denial of Service Attack Generator in Apache JMeter
    Grabovsky, Stepan
    Cika, Petr
    Zeman, Vaclav
    Clupek, Vlastimil
    Svehlak, Milan
    Klimes, Jan
    2018 10TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT 2018): EMERGING TECHNOLOGIES FOR CONNECTED SOCIETY, 2018,
  • [30] Model Checking Denial-of-Service Attack against IEEE 802.15.6 Protocol
    Liu, Henan
    Wang, Yanmei
    Zheng, Kai
    Huang, Xin
    2018 NINTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME 2018), 2018, : 857 - 861