Simulation of IP traceback for the denial of service attack

被引:0
|
作者
Yamana, M [1 ]
Hirata, K [1 ]
Shimizu, H [1 ]
Nakatani, H [1 ]
Kai, T [1 ]
Tsukamoto, K [1 ]
机构
[1] Matsushita Elect Works Ltd, Kadoma, Osaka 5718686, Japan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, DoS attacks are becoming more serious in security of the. Internet. They are rather easy to implement, but difficult to prevent. Therefore, tracing to the attackers and punishing them is considered to be an effective means against the attacks. Several tracing mechanisms have been proposed and analyzed for simplified models. This paper describes a simulation method for two network models, ICMP traceback (iTrace) and IP marking traceback (LP marking). This method modifies the OPNET to add the tracing codes. Also descried is the results of simulation experiment, which indicate the effectiveness of the method.
引用
收藏
页码:110 / 113
页数:4
相关论文
共 50 条
  • [11] AUTONOMOUS SYSTEM TRACEBACK FOR DENIAL OF SERVICE MITIGATION
    Alenezi, Mohammed
    Reed, Martin J.
    4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING ( ICACTE 2011), 2011, : 259 - 262
  • [12] IP traceback algorithm for DoS/DDoS attack
    Yim, Hong-bin
    Jung, Jae-il
    MANAGEMENT OF CONVERGENCE NETWORKS AND SERVICES, PROCEEDINGS, 2006, 4238 : 558 - 561
  • [13] Denial of service attack simulation based-on CASL
    Zhao, Kuo
    Yang, Kexin
    Zhang, Meng
    Wang, Jinling
    Hu, Liang
    2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 266 - +
  • [14] A Model of IP Traceability Dynamic Collaboration Technology in the Denial of Service Attack
    Li Qingshan
    2012 INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION TECHNOLOGY (FGCT), 2012, : 133 - 136
  • [15] A method of IP traceback against DDoS attack
    Institute of Computer, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
    不详
    Jisuanji Gongcheng, 2006, 8 (181-182+231):
  • [16] IP trace back techniques to ferret out denial of service attack source
    Aijaz, Adnan
    Mohsin, Syed Raza
    Mofassir-Ul-Haque
    PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND PRIVACY (ISP '07): ADVANCED TOPICS IN INFORMATION SECURITY AND PRIVACY, 2007, : 135 - 140
  • [17] A new scheme for IP traceback under DoS attack
    Tian, HT
    Huang, LS
    Lei, YF
    Chen, GL
    PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 189 - 193
  • [18] A novel protocol for IP traceback to detect DDoS attack
    Meena, Yogesh Kumar
    Trivedi, Aditya
    International Journal of Computer Science Issues, 2012, 9 (4 4-1): : 284 - 291
  • [19] UDP based IP Traceback for Flooding DDoS Attack
    Murugesan, Vijayalakshmi
    Selvaraj, MercyShalinie
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (01) : 103 - 111
  • [20] Research on IP Traceback Technology Based on DDoS Attack
    Tian Zhuo
    Li Baicheng
    MODERN TECHNOLOGIES IN MATERIALS, MECHANICS AND INTELLIGENT SYSTEMS, 2014, 1049 : 1820 - 1823