An intelligent model for mitigating the attack effects

被引:0
|
作者
Sobh, TS [1 ]
Hamed, EM [1 ]
机构
[1] Egyptian Armed Forces, Cairo, Egypt
关键词
network threats; IP spoofing; IP traceback; and probabilistic packet marking;
D O I
10.1109/ICEEC.2004.1374411
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
IP spoofing enables the network attackers to hide their identity while the IP traceback allows victim to identify the origin of attackers. Many IP traceback techniques are suggested such as ICMP trace messages, Probabilistic Packet Marking, Hash-based IP Traceback, etc. The aim of this work is to present an Intelligent Packet Filtering for defending against both the network Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. In addition, : the proposed model introduces active response mechanism for taking rapid action against attacker. This work is motivated by the increased frequency mid sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or "spoofed", source addresses. Also, this paper presents within the proposed model a tracing approach based on the packet marking.
引用
收藏
页码:165 / 168
页数:4
相关论文
共 50 条
  • [1] Attack Model for Generic Intelligent Systems
    Boonkrong, Sirapat
    [J]. JOURNAL OF APPLIED SECURITY RESEARCH, 2023,
  • [2] Intelligent model for cyber attack detection and prevention
    Hentea, M
    [J]. PROCEEDINGS OF THE ISCA 12TH INTERNATIONAL CONFERENCE INTELLIGENT AND ADAPTIVE SYSTEMS AND SOFTWARE ENGINEERING, 2003, : 5 - 10
  • [3] Mitigating JTAG as an Attack Surface
    Sguigna, Alan
    [J]. 2019 IEEE AUTOTESTCON, 2019,
  • [4] Modeling and Mitigating the Coremelt Attack
    Yang, Guosong
    Hosseini, Hossein
    Sahabandu, Dinuka
    Clark, Andrew
    Hespanha, Joao
    Poovendran, Radha
    [J]. 2018 ANNUAL AMERICAN CONTROL CONFERENCE (ACC), 2018, : 3410 - 3416
  • [5] An Intelligent Model for Vulnerability Analysis Using Attack Graph
    Wang Yi
    Xiao Jinghua
    [J]. 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 526 - 529
  • [6] Attack detection and mitigation using Intelligent attack graph model for Forensic in IoT Networks
    Bhardwaj, Sonam
    Dave, Mayank
    [J]. TELECOMMUNICATION SYSTEMS, 2024, 85 (04) : 601 - 621
  • [7] Attack detection and mitigation using Intelligent attack graph model for Forensic in IoT Networks
    Sonam Bhardwaj
    Mayank Dave
    [J]. Telecommunication Systems, 2024, 85 : 601 - 621
  • [8] Development of an Intelligent Classifier Model for Denial of Service Attack Detection
    Michelena, Alvaro
    Aveleira-Mata, Jose
    Jove, Esteban
    Alaiz-Moreton, Hector
    Quintian, Hector
    Calvo-Rolle, Jose Luis
    [J]. INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2023, 8 (03): : 33 - 42
  • [9] Mitigating Poisoning Attack in Federated Learning
    Uprety, Aashma
    Rawat, Danda B.
    [J]. 2021 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2021), 2021,
  • [10] Retpoline Technique for Mitigating Spectre Attack
    Kadir, MohdFadzil Abdul
    Kee, Wong Jin
    Ab Wahab, Fauziah
    Bharun, Ahmad Faisal Amri Abidin
    Mohamed, Mohamad Afendee
    Zakaria, Aznida Hayati
    [J]. 2019 6TH INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONICS ENGINEERING (ICEEE 2019), 2019, : 96 - 101