An Effective Traceback Network Attack Procedure for Source Address Verification

被引:0
|
作者
Sudhakar Balraj
Kavisankar Leelasankar
Ayyasamy Ayyanar
Harold Robinson Yesudhas
Raghvendra Kumar
Hoang Viet Long
Le Hoang Son
机构
[1] Annamalai University,Department of Electronics and Communication Engineering
[2] Hindustan Institute of Technology and Science,School of Computing Sciences
[3] Annamalai University,Department of Computer Science and Engineering, FEAT
[4] Vellore Institute of Technology,School of Information Technology and Engineering
[5] GIET University,Department of Computer Science and Engineering
[6] Institute for Computational Science,Division of Computational Mathematics and Engineering
[7] Ton Duc Thang University,Faculty of Mathematics and Statistics
[8] Ton Duc Thang University,VNU Information Technology Institute
[9] Vietnam National University,undefined
来源
关键词
IP spoofing; Combined IP traceback procedure; Packet marking; Packet logging;
D O I
暂无
中图分类号
学科分类号
摘要
The Internet is being extensively used in various fields to serve billions of users, which leads to the number of network security issues. Here, Internet Protocol Spoofing is considered the main threat for masquerade of the packet identity. An IP packet, which contains the header with the source IP address, lacks source verification. The invaders to spoof the network address of the packet use this vulnerability. To overcome this, verification of source is performed by marking the packets and tracing back to the source. Existing schemes make use of either packet marking or packet logging for trace back to the source with high computational and storage overhead. This paper proposed a scheme to minimize both the overheads by using a Combined IP Traceback procedure. Packet marking is done efficiently by using the 16-bit ID field of the packet header and packet logging is completed more effectively by using the hash table. The path reconstruction is done using the mark value in the packet, which traces back to the original source border router. The proposed method is empirically validated against the related ones.
引用
收藏
页码:1675 / 1696
页数:21
相关论文
共 50 条
  • [41] Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network
    Agrawal, Sarita
    Das, Manik Lal
    Mathuria, Anish
    Srivastava, Sanjay
    INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 419 - 440
  • [42] Security against Sybil Attack in Wireless Sensor Network through Location Verification
    Saha, Indranil
    Mukhopadhyay, Debapriyay
    DISTRIBUTED COMPUTING AND NETWORKING, 2009, 5408 : 187 - +
  • [43] A Universal Identity Backdoor Attack against Speaker Verification based on Siamese Network
    Zhao, Haodong
    Du, Wei
    Guo, Junjie
    Liu, Gongshen
    INTERSPEECH 2022, 2022, : 4770 - 4774
  • [44] Experimental Verification of the Neural Network Predicting Procedure Applied for UTC(PL)
    Sobolewski, Lukasz
    Miczulski, Wieslaw
    Czubla, Albin
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2021, 70
  • [45] Deployment of Source Address Validation by Network Operators: A Randomized Control Trial
    Lone, Qasim
    Frik, Alisa
    Luckie, Matthew
    Korczynski, Maciej
    van Eeten, Michel
    Ganan, Carlos
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 2361 - 2378
  • [46] Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet
    Luckie, Matthew
    Beverly, Robert
    Koga, Ryan
    Keys, Ken
    Kroll, Joshua A.
    Claffy, K.
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 465 - 480
  • [47] A Two-Level Source Address Spoofing Prevention based on Automatic Signature and Verification Mechanism
    Shen, Yan
    Bi, Jun
    Wu, Jianping
    Liu, Qiang
    2008 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2008, : 621 - 626
  • [48] Effective Controlling Scheme to Mitigate Flood Attack in Delay Tolerant Network
    Zekkori, Hanane
    Agoujil, Said
    Qaraai, Youssef
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (10) : 749 - 758
  • [49] An Attack-Resilient Source Authentication Protocol in Controller Area Network
    Kang, Ki-Dong
    Baek, Youngmi
    Lee, Seonghun
    Son, Sang Hyuk
    2017 ACM/IEEE SYMPOSIUM ON ARCHITECTURES FOR NETWORKING AND COMMUNICATIONS SYSTEMS (ANCS), 2017, : 109 - 118
  • [50] A geometrical based procedure for source separation mapped to a neural network
    Puntonet, CG
    Alvarez, MR
    Prieto, A
    FROM NATURAL TO ARTIFICIAL NEURAL COMPUTATION, 1995, 930 : 898 - 905