A Model of IP Traceability Dynamic Collaboration Technology in the Denial of Service Attack

被引:0
|
作者
Li Qingshan [1 ]
机构
[1] Peking Univ, Beijing 100871, Peoples R China
关键词
Denial of Service attack; IP traceability; Dynamic collaboration model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a model of IP traceability Dynamic Collaboration technology in the denial of service attack; analyzes the behavior of using illegal attack means to terminate the service capabilities of the target object in heterogeneous networks; provides a method of network transmission which is capable of dynamically adjusting data packet marking probability and making information to detect the abnormal traffic; and establishes three-layer dynamic collaboration marking architecture: traceability management layer, network proxy layer and network router layer. This paper conduct a confirmatory reconstruction of DoS attack path, and through designing collaboration model algorithm which based on threshold of data packet arrival rate, CPU usage threshold, probabilistic marking probability and dynamic adjustment factor given by collaboration architecture, as well as flexibly using identification, flag and bit offset about IP data packet fragmentation-related fields. The results show that the attack path will be accurately constructed by means of the probabilistic marking and dynamic collaboration, and IP traceability efficiency is over 97% which can achieve the purpose of traceability attack source.
引用
收藏
页码:133 / 136
页数:4
相关论文
共 50 条
  • [41] Modeling and simulation for detecting a distributed denial of service attack
    Seo, HS
    Cho, HT
    AL 2002: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2002, 2557 : 179 - 190
  • [42] Denial-of-service attack-detection techniques
    Carl, G
    Kesidis, G
    Brooks, RR
    Rai, S
    IEEE INTERNET COMPUTING, 2006, 10 (01) : 82 - 89
  • [43] Attack Detection of Distributed Denial of Service Based on Splunk
    Su, Te-Jen
    Wang, Shih-Ming
    Chen, Yi-Feng
    Liu, Chao-Liang
    PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS FOR SCIENCE AND ENGINEERING (IEEE-ICAMSE 2016), 2016, : 397 - 400
  • [44] An Intelligence Technique for Denial of Service (DoS) Attack Detection
    Manan, Wan Nurulsafawati Wan
    Safiuddin, Tuan Muhammad
    Dzolkhifli, Zarina
    Hassin, Mohd Hafiz Mohd
    ADVANCED SCIENCE LETTERS, 2018, 24 (10) : 7446 - 7450
  • [45] Honeypot Scheme for Distributed Denial-of-Service Attack
    Das, Vinu V.
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 497 - 501
  • [46] The Solution of Denial of Service Attack on Ordered Broadcast Intent
    Oh, Ji-Soo
    Park, Min-Woo
    Chung, Tai-Myoung
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 397 - 400
  • [47] Characterization and Comparison of Distributed Denial of Service Attack Tools
    Kaur, Harjeet
    Behal, Sunny
    Kumar, Krishan
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1139 - 1145
  • [48] On Implicit Denial of Service Attack in NDN and Potential Mitigations
    Panwar, Gaurav
    Tourani, Reza
    Mick, Travis
    Misra, Satyajayant
    Mtibaa, Abderrahmen
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2018,
  • [49] An Effective Performance For Denial Of Service Attack (DoS) Detection
    Hemalatha, P.
    Vijithaananthi, J.
    2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), 2017, : 229 - 233
  • [50] Intrusion detection of distributed denial of service attack in cloud
    Velliangiri, S.
    Premalatha, J.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 10615 - 10623