An Effective Traceback Network Attack Procedure for Source Address Verification

被引:0
|
作者
Sudhakar Balraj
Kavisankar Leelasankar
Ayyasamy Ayyanar
Harold Robinson Yesudhas
Raghvendra Kumar
Hoang Viet Long
Le Hoang Son
机构
[1] Annamalai University,Department of Electronics and Communication Engineering
[2] Hindustan Institute of Technology and Science,School of Computing Sciences
[3] Annamalai University,Department of Computer Science and Engineering, FEAT
[4] Vellore Institute of Technology,School of Information Technology and Engineering
[5] GIET University,Department of Computer Science and Engineering
[6] Institute for Computational Science,Division of Computational Mathematics and Engineering
[7] Ton Duc Thang University,Faculty of Mathematics and Statistics
[8] Ton Duc Thang University,VNU Information Technology Institute
[9] Vietnam National University,undefined
来源
关键词
IP spoofing; Combined IP traceback procedure; Packet marking; Packet logging;
D O I
暂无
中图分类号
学科分类号
摘要
The Internet is being extensively used in various fields to serve billions of users, which leads to the number of network security issues. Here, Internet Protocol Spoofing is considered the main threat for masquerade of the packet identity. An IP packet, which contains the header with the source IP address, lacks source verification. The invaders to spoof the network address of the packet use this vulnerability. To overcome this, verification of source is performed by marking the packets and tracing back to the source. Existing schemes make use of either packet marking or packet logging for trace back to the source with high computational and storage overhead. This paper proposed a scheme to minimize both the overheads by using a Combined IP Traceback procedure. Packet marking is done efficiently by using the 16-bit ID field of the packet header and packet logging is completed more effectively by using the hash table. The path reconstruction is done using the mark value in the packet, which traces back to the original source border router. The proposed method is empirically validated against the related ones.
引用
收藏
页码:1675 / 1696
页数:21
相关论文
共 50 条
  • [31] Destination address monitoring scheme for detecting DDoS attack in centralized control network
    Shim, Sang-Heon
    Yoo, Kyoung-Min
    Han, Kyeong-Eun
    Kang, Chol-Ku
    So, Won-Ho
    Song, Jong-Tae
    Kim, Young-Chon
    2006 ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2006, : 650 - 654
  • [32] Transient MAC address scheme for untraceability and DoS attack resiliency on wireless network
    Inone, D
    Nomura, R
    Kuroda, M
    2005 WIRELESS TELECOMMUNICATIONS SYMPOSIUM, 2005, : 15 - 23
  • [33] Multi-variant network address hopping to defend stealthy crossfire attack
    Boyang Zhou
    Gaoning Pan
    Chunming Wu
    Kai Zhu
    Wei Ruan
    Science China Information Sciences, 2020, 63
  • [34] A New Local Area Network Attack through IP and MAC Address Spoofing
    Shaw, Shashi
    Choudhury, Prasenjit
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 347 - 350
  • [35] Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment
    Latif, Rabia
    Abbas, Haider
    Latif, Seemab
    Masood, Ashraf
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (07)
  • [36] Multi-variant network address hopping to defend stealthy crossfire attack
    Boyang ZHOU
    Gaoning PAN
    Chunming WU
    Kai ZHU
    Wei RUAN
    Science China(Information Sciences), 2020, 63 (06) : 241 - 243
  • [37] Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment
    Rabia Latif
    Haider Abbas
    Seemab Latif
    Ashraf Masood
    Journal of Medical Systems, 2016, 40
  • [38] Network Intrusion Detection System for Jamming Attack in LoRaWAN join procedure
    Danish, Syed Muhammad
    Nasir, Arfa
    Qureshi, Hassaan Khaliq
    Ashfaq, Ayesha Binte
    Mumtaz, Shahid
    Rodriguez, Jonathan
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [39] An intelligent approach for dynamic network traffic restriction using MAC address verification
    Anathi, M.
    Vijayakumar, K.
    COMPUTER COMMUNICATIONS, 2020, 154 : 559 - 564
  • [40] Partial Cuts in Attack Graphs for Cost Effective Network Defence
    Sawilla, Reginald
    Skillicorn, David
    2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 291 - 297