An Effective Traceback Network Attack Procedure for Source Address Verification

被引:0
|
作者
Sudhakar Balraj
Kavisankar Leelasankar
Ayyasamy Ayyanar
Harold Robinson Yesudhas
Raghvendra Kumar
Hoang Viet Long
Le Hoang Son
机构
[1] Annamalai University,Department of Electronics and Communication Engineering
[2] Hindustan Institute of Technology and Science,School of Computing Sciences
[3] Annamalai University,Department of Computer Science and Engineering, FEAT
[4] Vellore Institute of Technology,School of Information Technology and Engineering
[5] GIET University,Department of Computer Science and Engineering
[6] Institute for Computational Science,Division of Computational Mathematics and Engineering
[7] Ton Duc Thang University,Faculty of Mathematics and Statistics
[8] Ton Duc Thang University,VNU Information Technology Institute
[9] Vietnam National University,undefined
来源
关键词
IP spoofing; Combined IP traceback procedure; Packet marking; Packet logging;
D O I
暂无
中图分类号
学科分类号
摘要
The Internet is being extensively used in various fields to serve billions of users, which leads to the number of network security issues. Here, Internet Protocol Spoofing is considered the main threat for masquerade of the packet identity. An IP packet, which contains the header with the source IP address, lacks source verification. The invaders to spoof the network address of the packet use this vulnerability. To overcome this, verification of source is performed by marking the packets and tracing back to the source. Existing schemes make use of either packet marking or packet logging for trace back to the source with high computational and storage overhead. This paper proposed a scheme to minimize both the overheads by using a Combined IP Traceback procedure. Packet marking is done efficiently by using the 16-bit ID field of the packet header and packet logging is completed more effectively by using the hash table. The path reconstruction is done using the mark value in the packet, which traces back to the original source border router. The proposed method is empirically validated against the related ones.
引用
收藏
页码:1675 / 1696
页数:21
相关论文
共 50 条
  • [21] An effective recognition method for network attack
    Liu, Ying
    Gu, Wen-Xiang
    OPTIK, 2013, 124 (21): : 4823 - 4826
  • [22] Hydra: Effective Runtime Network Verification
    Renganathan, Sundararajan
    Rubin, Benny
    Kim, Hyojoon
    Ventre, Pier Luigi
    Cascone, Carmelo
    Moro, Daniele
    Chan, Charles
    McKeown, Nick
    Foster, Nate
    PROCEEDINGS OF THE 2023 ACM SIGCOMM 2023 CONFERENCE, SIGCOMM 2023, 2023, : 182 - 194
  • [23] A General Framework of Source Address Validation and Traceback for IPv4/IPv6 Transition Scenarios
    Hu, Guangwu
    Xu, Ke
    Wu, Jianping
    Cui, Yong
    Shi, Fan
    IEEE NETWORK, 2013, 27 (06): : 66 - 73
  • [24] Open source verification in an anonymous volunteer network
    Breuer, Peter T.
    Pickin, Simon
    SCIENCE OF COMPUTER PROGRAMMING, 2014, 91 : 161 - 187
  • [25] Source attribution for network address translated forensic captures
    Cohen, M. I.
    DIGITAL INVESTIGATION, 2009, 5 (3-4) : 138 - 145
  • [26] Source Address Validation Improvements In Construction of Campus Network
    Zhu, Zhiyu
    Xu, Xiangyang
    GREEN POWER, MATERIALS AND MANUFACTURING TECHNOLOGY AND APPLICATIONS III, PTS 1 AND 2, 2014, 484-485 : 812 - 816
  • [27] An Effective Classifier Model for Imbalanced Network Attack Data
    Cetin, Gucan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (03): : 4519 - 4539
  • [28] Identification of Effective Network Features for Probing Attack Detection
    Zargar, Gholam Reza
    Kabiri, Peyman
    NDT: 2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKED DIGITAL TECHNOLOGIES, 2009, : 392 - 397
  • [29] DDoS attack and source detection system for ISP network
    Ano, S
    Hasegawa, T
    Kubota, F
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INTERNET, AND INFORMATION TECHNOLOGY, 2002, : 118 - 123
  • [30] Multi-variant network address hopping to defend stealthy crossfire attack
    Zhou, Boyang
    Pan, Gaoning
    Wu, Chunming
    Zhu, Kai
    Ruan, Wei
    SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (06)