Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices

被引:7
|
作者
Yang, Ming-Hour [1 ]
Luo, Jia-Ning [2 ]
Vijayalakshmi, M. [3 ]
Shalinie, S. Mercy [3 ]
机构
[1] Chung Yuan Christian Univ, Dept Informat & Comp Engn, Taoyuan 320314, Taiwan
[2] Ming Chuan Univ, Dept Informat & Telecommun, Taoyuan 333321, Taiwan
[3] Thiagarajar Coll Engn, Dept Comp Sci & Engn, Network Lab, Madurai 625015, Tamil Nadu, India
关键词
Switches; IP networks; Computer crime; Autonomous systems; Internet; Object recognition; IP traceback; DDoS attack; attack mitigation; layer; 2; traceback; autonomous system; attack detection; IP spoofing; advanced persistent threats; PACKET MARKING; IP TRACEBACK;
D O I
10.1109/ACCESS.2020.3034226
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advent of the Internet of Things (IoT), there are also major information security risks hidden behind them. There are major information security risks hidden behind them. Attackers can conceal their actual attack locations by spoofing IP addresses to attack IoT devices, law enforcement cannot easily track them. Therefore, a method to trace stealth attacks is required. Conventional IP traceback methods that traceback only attackers on the network layer and cannot infer the path information of a packet traversing the switch. This article proposes a method to simultaneously traceback attack sources at the network layer and the data link layer with only one single packet. Even if the core network contains a switch or if multiple attackers launch attacks from different locations, the method can correctly traceback the true devices responsible for the attacks, and its achievements include a zero false negative rate and a low false positive rate.
引用
收藏
页码:201087 / 201097
页数:11
相关论文
共 50 条
  • [21] Blind Equalization Using a Hybrid Algorithm of Multilayer Neural Network
    梁启联
    HighTechnologyLetters, 1996, (01) : 47 - 50
  • [22] An efficient hybrid multilayer perceptron neural network with grasshopper optimization
    Heidari, Ali Asghar
    Faris, Hossam
    Aljarah, Ibrahim
    Mirjalili, Seyedali
    SOFT COMPUTING, 2019, 23 (17) : 7941 - 7958
  • [23] Blind equalization using a hybrid algorithm of multilayer neural network
    Beijing Univ of Posts &, Telecommunications, Beijing, China
    High Technol Letters, 1 (47-50):
  • [24] Multilayer validation system for the automation of data in a WSN network with IOT devices
    Paz Fernandez, Luisa Fernanda
    Ruiz Rosero, Juan Pablo
    Ramirez Gonzalez, Gustavo Adolto
    INGENIERIA SOLIDARIA, 2021, 17 (01):
  • [25] An efficient hybrid multilayer perceptron neural network with grasshopper optimization
    Ali Asghar Heidari
    Hossam Faris
    Ibrahim Aljarah
    Seyedali Mirjalili
    Soft Computing, 2019, 23 : 7941 - 7958
  • [26] Finding DDoS Attack Sources: Searchlight Localization Algorithm for Network Tomography
    Demir, Omer
    Khan, Bilal
    2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 418 - 423
  • [27] Model Poisoning Attack Against Neural Network Interpreters in IoT Devices
    Zhang, Xianglong
    Li, Feng
    Zhang, Huanle
    Zhang, Haoxin
    Huang, Zhijian
    Fan, Lisheng
    Cheng, Xiuzhen
    Hu, Pengfei
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2025, 24 (03) : 1715 - 1730
  • [28] Wormhole Attack Detection System for IoT Network: A Hybrid Approach
    Snehal A. Bhosale
    S. S. Sonavane
    Wireless Personal Communications, 2022, 124 : 1081 - 1108
  • [29] Application of hybrid strategies of complex network attack and defense games
    Li, Zhe
    Liu, Jin
    Ren, Jiaqi
    Dong, Yibo
    Li, Weili
    CHAOS SOLITONS & FRACTALS, 2024, 189
  • [30] Wormhole Attack Detection System for IoT Network: A Hybrid Approach
    Bhosale, Snehal A.
    Sonavane, S. S.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (02) : 1081 - 1108