Simulation of IP traceback for the denial of service attack

被引:0
|
作者
Yamana, M [1 ]
Hirata, K [1 ]
Shimizu, H [1 ]
Nakatani, H [1 ]
Kai, T [1 ]
Tsukamoto, K [1 ]
机构
[1] Matsushita Elect Works Ltd, Kadoma, Osaka 5718686, Japan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, DoS attacks are becoming more serious in security of the. Internet. They are rather easy to implement, but difficult to prevent. Therefore, tracing to the attackers and punishing them is considered to be an effective means against the attacks. Several tracing mechanisms have been proposed and analyzed for simplified models. This paper describes a simulation method for two network models, ICMP traceback (iTrace) and IP marking traceback (LP marking). This method modifies the OPNET to add the tracing codes. Also descried is the results of simulation experiment, which indicate the effectiveness of the method.
引用
收藏
页码:110 / 113
页数:4
相关论文
共 50 条
  • [41] Defend Against Denial of Service Attack with VMM
    Zhao, Siqin
    Chen, Kang
    Zheng, Weimin
    2009 EIGHTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2009, : 91 - 96
  • [42] A Denial of Service Attack Method for an IoT System
    Liang, Lulu
    Zheng, Kai
    Sheng, Qiankun
    Huang, Xin
    2016 8TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME), 2016, : 360 - 364
  • [43] Denial of Service Attack in Software Defined Network
    Bera, Piu
    Saha, Ankita
    Setua, S. K.
    PROCEEDINGS OF 2016 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2016, : 497 - 501
  • [44] A detection design for distributed denial of service attack
    Fujita, N
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, PROCEEDINGS: INFORMATION SYSTEMS DEVELOPMENT I, 2002, : 78 - 82
  • [45] Distributed Denial of Service: Attack techniques and mitigation
    Vanitha, K. S.
    Uma, S. V.
    Mahidhar, S. K.
    2017 2ND INTERNATIONAL CONFERENCE ON CIRCUITS, CONTROLS, AND COMMUNICATIONS (CCUBE), 2017, : 226 - 231
  • [46] An analysis and fingerprinting of a distributed denial of service attack
    Sung, MH
    Haas, M
    Xu, J
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VIII, PROCEEDINGS: CONCEPTS AND APPLICATIONS OF SYSTEMICS, CYBERNETICS AND INFORMATICS II, 2002, : 274 - 279
  • [47] Denial-of-Service Attack Detection System
    Thakare, Supriya S.
    Kaur, Parminder
    2017 1ST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND INFORMATION MANAGEMENT (ICISIM), 2017, : 281 - 285
  • [48] Denial of Service Attack Generator in Apache JMeter
    Grabovsky, Stepan
    Cika, Petr
    Zeman, Vaclav
    Clupek, Vlastimil
    Svehlak, Milan
    Klimes, Jan
    2018 10TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT 2018): EMERGING TECHNOLOGIES FOR CONNECTED SOCIETY, 2018,
  • [49] Increasing accuracy and reliability of IP traceback for DDoS attack using completion condition
    Saurabh, Samant
    Sairam, Ashok Singh
    International Journal of Network Security, 2016, 18 (02): : 224 - 234
  • [50] Effectiveness of advanced and authenticated packet marking scheme for traceback of denial of service attacks
    Rizvi, B
    Fernández-Gaucherand, E
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 111 - 115