Discovering Attack Path Oriented-IP Traceback

被引:0
|
作者
傅建明
机构
[1] College of Computer Science Wuhan University
[2] P.R.China
[3] Wuhan 430072
关键词
IP traceback; network performance measurement; path discovering; network Security;
D O I
暂无
中图分类号
TP393 [计算机网络];
学科分类号
081201 ; 1201 ;
摘要
The technique of IP traceback may effectively block DOS (Denial Of Service) and meet the requirement of the computer forensic, but its accuracy depends upon that condition that each node in the Internet must support IP packet marking or detected agents. So far, this requirement is not satisfied. On the basis of traditional traceroute,this paper investigates the efficiency of discovering path methods from aspects of the size and order of detecting packets, and the length of paths.It points out that the size of padding in probed packets has a slight effect on discovering latency, and the latency with the method of bulk sending receiving is much smaller than one with the traditional traceroute. Moreover, the loss rate of packets with the technique of TTL (Time To Live) which increases monotonously is less than that with the technique of TTL which decreases monotonously. Lastly,OS (Operating System) passive fingerprint is used as heuristic to predict the length of the discovered path so as to reduce disturbance in network traffic.
引用
收藏
页码:56 / 60
页数:5
相关论文
共 50 条
  • [1] IP Traceback Schemes for DDoS Attack
    Mandhar, Vipul
    Ranga, Virender
    NETWORKING COMMUNICATION AND DATA KNOWLEDGE ENGINEERING, VOL 1, 2018, 3 : 37 - 50
  • [2] Identifying the Attack Source by IP Traceback
    Nalavade, K. C.
    Meshram, B. B.
    INFORMATION AND COMMUNICATION TECHNOLOGIES, 2010, 101 : 292 - 296
  • [3] ICMP traceback with cumulative path, an efficient solution for IP traceback
    Lee, HCJ
    Thing, VLL
    Xu, Y
    Ma, M
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 124 - 135
  • [4] ISP Traceback - Attack Path Detection
    Stelte, Bjoern
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 363 - 364
  • [5] Simulation of IP traceback for the denial of service attack
    Yamana, M
    Hirata, K
    Shimizu, H
    Nakatani, H
    Kai, T
    Tsukamoto, K
    2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 110 - 113
  • [6] IP traceback algorithm for DoS/DDoS attack
    Yim, Hong-bin
    Jung, Jae-il
    MANAGEMENT OF CONVERGENCE NETWORKS AND SERVICES, PROCEEDINGS, 2006, 4238 : 558 - 561
  • [7] A method of IP traceback against DDoS attack
    Institute of Computer, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
    不详
    Jisuanji Gongcheng, 2006, 8 (181-182+231):
  • [8] A new scheme for IP traceback under DoS attack
    Tian, HT
    Huang, LS
    Lei, YF
    Chen, GL
    PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 189 - 193
  • [9] A novel protocol for IP traceback to detect DDoS attack
    Meena, Yogesh Kumar
    Trivedi, Aditya
    International Journal of Computer Science Issues, 2012, 9 (4 4-1): : 284 - 291
  • [10] UDP based IP Traceback for Flooding DDoS Attack
    Murugesan, Vijayalakshmi
    Selvaraj, MercyShalinie
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (01) : 103 - 111