Simulation of IP traceback for the denial of service attack

被引:0
|
作者
Yamana, M [1 ]
Hirata, K [1 ]
Shimizu, H [1 ]
Nakatani, H [1 ]
Kai, T [1 ]
Tsukamoto, K [1 ]
机构
[1] Matsushita Elect Works Ltd, Kadoma, Osaka 5718686, Japan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, DoS attacks are becoming more serious in security of the. Internet. They are rather easy to implement, but difficult to prevent. Therefore, tracing to the attackers and punishing them is considered to be an effective means against the attacks. Several tracing mechanisms have been proposed and analyzed for simplified models. This paper describes a simulation method for two network models, ICMP traceback (iTrace) and IP marking traceback (LP marking). This method modifies the OPNET to add the tracing codes. Also descried is the results of simulation experiment, which indicate the effectiveness of the method.
引用
收藏
页码:110 / 113
页数:4
相关论文
共 50 条
  • [31] New denial of service attack on Internet
    Hancock, B
    COMPUTERS & SECURITY, 2000, 19 (04) : 309 - 310
  • [32] Collaborative Blockchain Based Distributed Denial of Service Attack Mitigation Approach with IP Reputation System
    Patel, Darshi
    Patel, Dhiren
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS. DASFAA 2022 INTERNATIONAL WORKSHOPS, 2022, 13248 : 91 - 103
  • [33] Computer Simulation of Denial of Service attack in Military Information Network using OPNET
    Pei, Lichun
    Li, Chenhui
    Hou, Runfeng
    Zhang, Yanjun
    Ou, Hongyan
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON MULTIMEDIA TECHNOLOGY (ICMT-13), 2013, 84 : 1333 - 1340
  • [34] Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment
    Latif, Rabia
    Abbas, Haider
    Latif, Seemab
    Masood, Ashraf
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (07)
  • [35] Improved technique of IP address fragmentation strategies for DoS attack traceback
    Kim, Byung-Ryong
    Kim, Ki-Chang
    COMPUTER SCIENCE - THEORY AND APPLICATIONS, 2006, 3967 : 427 - 437
  • [36] Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment
    Rabia Latif
    Haider Abbas
    Seemab Latif
    Ashraf Masood
    Journal of Medical Systems, 2016, 40
  • [37] Identification of the Real Source of DDOS Attack by FDPM in IP Traceback System
    Barokar, Gaurav D.
    Mahalle, V. S.
    UKSIM-AMSS EIGHTH EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS 2014), 2014, : 392 - 396
  • [38] On IP traceback
    Belenky, A
    Ansari, N
    IEEE COMMUNICATIONS MAGAZINE, 2003, 41 (07) : 142 - 153
  • [39] Formalized Description of Distributed Denial of Service Attack
    杜彦辉
    马锐
    刘玉树
    Journal of Beijing Institute of Technology, 2004, (04) : 360 - 364
  • [40] Implementation and comparison of denial of service attack techniques
    Elleithy, KM
    Blagovic, D
    Cheng, W
    Sideleau, P
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 336 - 341