Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices

被引:7
|
作者
Yang, Ming-Hour [1 ]
Luo, Jia-Ning [2 ]
Vijayalakshmi, M. [3 ]
Shalinie, S. Mercy [3 ]
机构
[1] Chung Yuan Christian Univ, Dept Informat & Comp Engn, Taoyuan 320314, Taiwan
[2] Ming Chuan Univ, Dept Informat & Telecommun, Taoyuan 333321, Taiwan
[3] Thiagarajar Coll Engn, Dept Comp Sci & Engn, Network Lab, Madurai 625015, Tamil Nadu, India
关键词
Switches; IP networks; Computer crime; Autonomous systems; Internet; Object recognition; IP traceback; DDoS attack; attack mitigation; layer; 2; traceback; autonomous system; attack detection; IP spoofing; advanced persistent threats; PACKET MARKING; IP TRACEBACK;
D O I
10.1109/ACCESS.2020.3034226
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advent of the Internet of Things (IoT), there are also major information security risks hidden behind them. There are major information security risks hidden behind them. Attackers can conceal their actual attack locations by spoofing IP addresses to attack IoT devices, law enforcement cannot easily track them. Therefore, a method to trace stealth attacks is required. Conventional IP traceback methods that traceback only attackers on the network layer and cannot infer the path information of a packet traversing the switch. This article proposes a method to simultaneously traceback attack sources at the network layer and the data link layer with only one single packet. Even if the core network contains a switch or if multiple attackers launch attacks from different locations, the method can correctly traceback the true devices responsible for the attacks, and its achievements include a zero false negative rate and a low false positive rate.
引用
收藏
页码:201087 / 201097
页数:11
相关论文
共 50 条
  • [1] Tracking Attack Sources based on Traceback Honeypot for ICS Network
    Abe, Shingo
    Tanaka, Yohei
    Uchida, Yukako
    Horata, Shinichi
    2017 56TH ANNUAL CONFERENCE OF THE SOCIETY OF INSTRUMENT AND CONTROL ENGINEERS OF JAPAN (SICE), 2017, : 717 - 723
  • [2] Architecture for multi-stage network attack traceback
    Strayer, WT
    Jones, CE
    Schwartz, BI
    Mikkelson, J
    Livadas, C
    LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2005, : 776 - 783
  • [3] An Effective Traceback Network Attack Procedure for Source Address Verification
    Balraj, Sudhakar
    Leelasankar, Kavisankar
    Ayyanar, Ayyasamy
    Yesudhas, Harold Robinson
    Kumar, Raghvendra
    Long, Hoang Viet
    Hoang Son, Le
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 118 (02) : 1675 - 1696
  • [4] An Effective Traceback Network Attack Procedure for Source Address Verification
    Sudhakar Balraj
    Kavisankar Leelasankar
    Ayyasamy Ayyanar
    Harold Robinson Yesudhas
    Raghvendra Kumar
    Hoang Viet Long
    Le Hoang Son
    Wireless Personal Communications, 2021, 118 : 1675 - 1696
  • [5] Identification of the Real Source of DDOS Attack by FDPM in IP Traceback System
    Barokar, Gaurav D.
    Mahalle, V. S.
    UKSIM-AMSS EIGHTH EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS 2014), 2014, : 392 - 396
  • [6] Traceback model for identifying sources of distributed attacks in real time
    Ahmed, Abdulghani Ali
    Sadiq, Ali Safa
    Zolkipli, Mohamad Fadli
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2173 - 2185
  • [7] Analysis of Cyber Attack Traceback Techniques from the Perspective of Network Forensics
    Liu X.-H.
    Ding L.-P.
    Zheng T.
    Wu J.-Z.
    Li Y.-F.
    Ruan Jian Xue Bao/Journal of Software, 2021, 32 (01): : 194 - 217
  • [8] An on-line DDoS attack Traceback and Mitigation System based on network performance monitoring
    Su, Wei-Tsung
    Lin, Tzu-Chieh
    Wu, Chun-Yi
    Hsu, Jang-Pong
    Kuo, Yau-Hwang
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1467 - +
  • [9] A Hybrid Traceback based Network Forensic Technique to Identifying Origin of Cybercrime
    Patil, Rachana
    Patil, Yogesh H.
    Kachhoria, Renu
    Kumbhare, Savita
    Bhandari, Sheetal U.
    Journal of Engineering Science and Technology Review, 2022, 15 (06) : 28 - 34
  • [10] A novel sequential watermark detection model for efficient traceback of secret network attack flows
    Wang, Xiaogang
    Yang, Ming
    Luo, Junzhou
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (06) : 1660 - 1670