A Model of IP Traceability Dynamic Collaboration Technology in the Denial of Service Attack

被引:0
|
作者
Li Qingshan [1 ]
机构
[1] Peking Univ, Beijing 100871, Peoples R China
关键词
Denial of Service attack; IP traceability; Dynamic collaboration model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a model of IP traceability Dynamic Collaboration technology in the denial of service attack; analyzes the behavior of using illegal attack means to terminate the service capabilities of the target object in heterogeneous networks; provides a method of network transmission which is capable of dynamically adjusting data packet marking probability and making information to detect the abnormal traffic; and establishes three-layer dynamic collaboration marking architecture: traceability management layer, network proxy layer and network router layer. This paper conduct a confirmatory reconstruction of DoS attack path, and through designing collaboration model algorithm which based on threshold of data packet arrival rate, CPU usage threshold, probabilistic marking probability and dynamic adjustment factor given by collaboration architecture, as well as flexibly using identification, flag and bit offset about IP data packet fragmentation-related fields. The results show that the attack path will be accurately constructed by means of the probabilistic marking and dynamic collaboration, and IP traceability efficiency is over 97% which can achieve the purpose of traceability attack source.
引用
收藏
页码:133 / 136
页数:4
相关论文
共 50 条
  • [31] Mathematical model on distributed denial of service attack through Internet of things in a network
    Mishra, Bimal Kumar
    Keshri, Ajit Kumar
    Mallick, Dheeresh Kumar
    Mishra, Binay Kumar
    NONLINEAR ENGINEERING - MODELING AND APPLICATION, 2019, 8 (01): : 486 - 495
  • [32] Puppet attack: A denial of service attack in advanced metering infrastructure network
    Yi, Ping
    Zhu, Ting
    Zhang, Qingquan
    Wu, Yue
    Pan, Li
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 59 : 325 - 332
  • [33] IP TRACEBACK SYSTEM FOR DENIAL-OF-SERVICE ATTACKS
    Tritilanunt, Suratose
    Salakit, Thananon
    Achwacheewanthornkul, Patchpon
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1867 - 1870
  • [34] A denial-of-service-resistant IP traceback approach
    Wang, BT
    Schulzrinne, H
    ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 351 - 356
  • [35] Advanced Persistent Distributed Denial of Service Attack Model on Scale-Free Networks
    Zhang, Chunming
    Peng, Junbiao
    Xiao, Jingwei
    SCIENCE OF CYBER SECURITY, SCISEC 2018, 2018, 11287 : 96 - 112
  • [36] Stability Analysis of an Advanced Persistent Distributed Denial-of-Service Attack Dynamical Model
    Zhang, Chunming
    Xiao, Jingwei
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [37] Model Checking Approach to Real-Time Aspects of Denial-of-Service Attack
    Arai, Tatsuya
    Nishizaki, Shin-ya
    COMMUNICATIONS AND INFORMATION PROCESSING, PT 1, 2012, 288 : 86 - 94
  • [38] SCAFFY: A Slow Denial-of-Service Attack Classification Model Using Flow Data
    Muraleedharan, N.
    Janet, B.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2021, 15 (03) : 106 - 128
  • [39] Intrusion detection of distributed denial of service attack in cloud
    S. Velliangiri
    J. Premalatha
    Cluster Computing, 2019, 22 : 10615 - 10623
  • [40] Cluster Analysis of Back Type of Denial of Service Attack
    Zheng, Jigang
    Zhang, Jingmei
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON SENSOR NETWORK AND COMPUTER ENGINEERING, 2016, 68 : 27 - 30