An Effective Traceback Network Attack Procedure for Source Address Verification

被引:0
|
作者
Sudhakar Balraj
Kavisankar Leelasankar
Ayyasamy Ayyanar
Harold Robinson Yesudhas
Raghvendra Kumar
Hoang Viet Long
Le Hoang Son
机构
[1] Annamalai University,Department of Electronics and Communication Engineering
[2] Hindustan Institute of Technology and Science,School of Computing Sciences
[3] Annamalai University,Department of Computer Science and Engineering, FEAT
[4] Vellore Institute of Technology,School of Information Technology and Engineering
[5] GIET University,Department of Computer Science and Engineering
[6] Institute for Computational Science,Division of Computational Mathematics and Engineering
[7] Ton Duc Thang University,Faculty of Mathematics and Statistics
[8] Ton Duc Thang University,VNU Information Technology Institute
[9] Vietnam National University,undefined
来源
关键词
IP spoofing; Combined IP traceback procedure; Packet marking; Packet logging;
D O I
暂无
中图分类号
学科分类号
摘要
The Internet is being extensively used in various fields to serve billions of users, which leads to the number of network security issues. Here, Internet Protocol Spoofing is considered the main threat for masquerade of the packet identity. An IP packet, which contains the header with the source IP address, lacks source verification. The invaders to spoof the network address of the packet use this vulnerability. To overcome this, verification of source is performed by marking the packets and tracing back to the source. Existing schemes make use of either packet marking or packet logging for trace back to the source with high computational and storage overhead. This paper proposed a scheme to minimize both the overheads by using a Combined IP Traceback procedure. Packet marking is done efficiently by using the 16-bit ID field of the packet header and packet logging is completed more effectively by using the hash table. The path reconstruction is done using the mark value in the packet, which traces back to the original source border router. The proposed method is empirically validated against the related ones.
引用
收藏
页码:1675 / 1696
页数:21
相关论文
共 50 条
  • [1] An Effective Traceback Network Attack Procedure for Source Address Verification
    Balraj, Sudhakar
    Leelasankar, Kavisankar
    Ayyanar, Ayyasamy
    Yesudhas, Harold Robinson
    Kumar, Raghvendra
    Long, Hoang Viet
    Hoang Son, Le
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 118 (02) : 1675 - 1696
  • [2] SAVT: A Practical Scheme for Source Address Validation and Traceback in Campus Network
    Hu, Guangwu
    Wu, Jianping
    Xu, Ke
    Chen, Wenlong
    2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [3] Identifying the Attack Source by IP Traceback
    Nalavade, K. C.
    Meshram, B. B.
    INFORMATION AND COMMUNICATION TECHNOLOGIES, 2010, 101 : 292 - 296
  • [4] Attack Source Traceback based on Stable Topology in MANET
    Zhang, Lili
    Jing, Yinan
    Wang, Xueping
    Cao, Xiu
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [5] Improved technique of IP address fragmentation strategies for DoS attack traceback
    Kim, Byung-Ryong
    Kim, Ki-Chang
    COMPUTER SCIENCE - THEORY AND APPLICATIONS, 2006, 3967 : 427 - 437
  • [6] Architecture for multi-stage network attack traceback
    Strayer, WT
    Jones, CE
    Schwartz, BI
    Mikkelson, J
    Livadas, C
    LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2005, : 776 - 783
  • [7] Traceback Coordination Model with Legal Requirements against Source Address Attacks
    Wakasa, Ken
    Takemori, Keisuke
    Kimura, Michihiro
    2009 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING, VOLS 1 AND 2, 2009, : 257 - 261
  • [8] Tracking Attack Sources based on Traceback Honeypot for ICS Network
    Abe, Shingo
    Tanaka, Yohei
    Uchida, Yukako
    Horata, Shinichi
    2017 56TH ANNUAL CONFERENCE OF THE SOCIETY OF INSTRUMENT AND CONTROL ENGINEERS OF JAPAN (SICE), 2017, : 717 - 723
  • [9] Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices
    Yang, Ming-Hour
    Luo, Jia-Ning
    Vijayalakshmi, M.
    Shalinie, S. Mercy
    IEEE ACCESS, 2020, 8 : 201087 - 201097
  • [10] Identification of the Real Source of DDOS Attack by FDPM in IP Traceback System
    Barokar, Gaurav D.
    Mahalle, V. S.
    UKSIM-AMSS EIGHTH EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS 2014), 2014, : 392 - 396