Discovering Attack Path Oriented-IP Traceback

被引:0
|
作者
傅建明
机构
[1] College of Computer Science Wuhan University
[2] P.R.China
[3] Wuhan 430072
关键词
IP traceback; network performance measurement; path discovering; network Security;
D O I
暂无
中图分类号
TP393 [计算机网络];
学科分类号
081201 ; 1201 ;
摘要
The technique of IP traceback may effectively block DOS (Denial Of Service) and meet the requirement of the computer forensic, but its accuracy depends upon that condition that each node in the Internet must support IP packet marking or detected agents. So far, this requirement is not satisfied. On the basis of traditional traceroute,this paper investigates the efficiency of discovering path methods from aspects of the size and order of detecting packets, and the length of paths.It points out that the size of padding in probed packets has a slight effect on discovering latency, and the latency with the method of bulk sending receiving is much smaller than one with the traditional traceroute. Moreover, the loss rate of packets with the technique of TTL (Time To Live) which increases monotonously is less than that with the technique of TTL which decreases monotonously. Lastly,OS (Operating System) passive fingerprint is used as heuristic to predict the length of the discovered path so as to reduce disturbance in network traffic.
引用
收藏
页码:56 / 60
页数:5
相关论文
共 50 条
  • [41] New algorithm NA for IP traceback
    Xia, Chun-He
    Shi, Yun-Ping
    Zhao, Qin-Ping
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2004, 41 (04): : 689 - 696
  • [42] The Systematic Survey for IP Traceback Methods
    Tian, Hongcheng
    Bi, Jun
    2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 906 - 911
  • [43] Opportunistic Piggyback Marking for IP Traceback
    Cheng, Long
    Divakaran, Dinil Mon
    Lim, Wee Yong
    Thing, Vrizlynn L. L.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) : 273 - 288
  • [44] Practical network support for IP traceback
    Savage, S
    Wetherall, D
    Karlin, A
    Anderson, T
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2000, 30 (04) : 295 - 306
  • [45] A Brief Survey of IP Traceback Methodologies
    Murugesan, Vijayalakshmi
    Shalinie, Mercy
    Neethimani, Nithya
    ACTA POLYTECHNICA HUNGARICA, 2014, 11 (09) : 197 - 216
  • [46] ICMP based IP traceback with negligible overhead for highly distributed reflector attack using bloom filters
    Saurabh, S.
    Sairam, A. S.
    COMPUTER COMMUNICATIONS, 2014, 42 : 60 - 69
  • [47] IP traceback with sparsely-tagged fragment marking scheme under massively multiple attack paths
    Kichang Kim
    Jeankyung Kim
    Jinsoo Hwang
    Cluster Computing, 2013, 16 : 229 - 239
  • [48] A Prediction Based Approach to IP Traceback
    Kiremire, Ankunda R.
    Brust, Matthias R.
    Phoha, Vir V.
    PROCEEDINGS OF THE 37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN 2012), 2012, : 1022 - 1029
  • [49] A packet marking scheme for IP traceback
    Qu, HP
    Su, PR
    Lin, DD
    Feng, DG
    NETWORKING - ICN 2005, PT 2, 2005, 3421 : 964 - 971
  • [50] An Efficient and Adaptive IP Traceback Scheme
    Iwamoto, Kayoko
    Soshi, Masakazu
    Satoh, Takashi
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED COMPUTING AND APPLICATIONS (SOCA), 2014, : 235 - 240