Simulation of IP traceback for the denial of service attack

被引:0
|
作者
Yamana, M [1 ]
Hirata, K [1 ]
Shimizu, H [1 ]
Nakatani, H [1 ]
Kai, T [1 ]
Tsukamoto, K [1 ]
机构
[1] Matsushita Elect Works Ltd, Kadoma, Osaka 5718686, Japan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, DoS attacks are becoming more serious in security of the. Internet. They are rather easy to implement, but difficult to prevent. Therefore, tracing to the attackers and punishing them is considered to be an effective means against the attacks. Several tracing mechanisms have been proposed and analyzed for simplified models. This paper describes a simulation method for two network models, ICMP traceback (iTrace) and IP marking traceback (LP marking). This method modifies the OPNET to add the tracing codes. Also descried is the results of simulation experiment, which indicate the effectiveness of the method.
引用
收藏
页码:110 / 113
页数:4
相关论文
共 50 条
  • [1] On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
    Park, K
    Lee, H
    IEEE INFOCOM 2001: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: TWENTY YEARS INTO THE COMMUNICATIONS ODYSSEY, 2001, : 338 - 347
  • [2] IP TRACEBACK SYSTEM FOR DENIAL-OF-SERVICE ATTACKS
    Tritilanunt, Suratose
    Salakit, Thananon
    Achwacheewanthornkul, Patchpon
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1867 - 1870
  • [3] A denial-of-service-resistant IP traceback approach
    Wang, BT
    Schulzrinne, H
    ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 351 - 356
  • [4] A systematic review of IP traceback schemes for denial of service attacks
    Singh, Karanpreet
    Singh, Paramuir
    Kumar, Krishan
    COMPUTERS & SECURITY, 2016, 56 : 111 - 139
  • [5] An IP traceback technique against denial-of-service attacks
    Chen, ZL
    Lee, MC
    19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 96 - 104
  • [6] A Survey of IP Traceback Mechanisms to overcome Denial-of-Service Attacks
    Vincent, Shweta
    Raja, J. Immanuel John
    RECENT ADVANCES IN NETWORKING, VLSI AND SIGNAL PROCESSING, 2010, : 93 - +
  • [7] IP Traceback Schemes for DDoS Attack
    Mandhar, Vipul
    Ranga, Virender
    NETWORKING COMMUNICATION AND DATA KNOWLEDGE ENGINEERING, VOL 1, 2018, 3 : 37 - 50
  • [8] Identifying the Attack Source by IP Traceback
    Nalavade, K. C.
    Meshram, B. B.
    INFORMATION AND COMMUNICATION TECHNOLOGIES, 2010, 101 : 292 - 296
  • [9] An Investigation about the Simulation of IP Traceback and Various IP Traceback Strategies
    Karthik, S.
    Arunachalam, V. P.
    Ravichandran, T.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (12): : 240 - 245
  • [10] Modeling and simulation for detecting a distributed denial of service attack
    Seo, HS
    Cho, HT
    AL 2002: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2002, 2557 : 179 - 190