IP traceback techniques for intrusion tracking

被引:0
|
作者
Nur, MM [1 ]
Syed, MR [1 ]
Bignall, RJ [1 ]
机构
[1] Minnesota State Univ, Dept Comp & Informat Sci, Mankato, MN 56001 USA
关键词
intrusion tracking; IP traceback; denial of service attack; packet marking; messaging; logging; link testing;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Denial of Service (DoS) is currently considered to be one of the most common types of Internet security attack. DoS attacks usually destroy the service-providing ability of web servers by consuming their resources, thus preventing legitimate users from receiving the expected services from them. Different access control and intrusion detection technologies have been developed for preventing and detecting these kinds of network attacks. Unfortunately, DoS attackers can hide their true identity by forging the IT address of attack packets, Therefore, in addition to detection, IP traceback techniques are needed in order to identify the true origin of the attack packets and to provide the capability to take action against the attackers. This paper examines some proposed IP traceback techniques and discusses their feasibility and limitations.
引用
收藏
页码:384 / 388
页数:5
相关论文
共 50 条
  • [1] On IP traceback
    Belenky, A
    Ansari, N
    IEEE COMMUNICATIONS MAGAZINE, 2003, 41 (07) : 142 - 153
  • [2] An Investigation about the Simulation of IP Traceback and Various IP Traceback Strategies
    Karthik, S.
    Arunachalam, V. P.
    Ravichandran, T.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (12): : 240 - 245
  • [3] IP Traceback In GPRS
    Bai, Qingchang
    Qi, Feng
    PROCEEDINGS OF 2011 INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENCE AND AWARENESS INTERNET, IET AIAI2011, 2011, : 283 - 287
  • [4] Taxonomy of IP Traceback
    Santhanam, Lakshmi
    Kumar, Anup
    Agrawal, Dharma P.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (01): : 79 - 93
  • [5] The Survey for IP Traceback
    Tian, Hongcheng
    Lin, Jinan
    MECHANICAL COMPONENTS AND CONTROL ENGINEERING III, 2014, 668-669 : 1339 - 1342
  • [6] Low Storage and Traceback Overhead IP Traceback System
    Malliga, S.
    Selvi, C. S. Kanimozhi
    Kogilavani, S. V.
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (01) : 27 - 45
  • [7] An SDN-based Intrusion Detection System using SVM with Selective Logging for IP Traceback
    Hadem, Pynbianglut
    Saikia, Dilip Kumar
    Moulik, Soumen
    COMPUTER NETWORKS, 2021, 191
  • [8] QuIT: Quantitative IP Traceback
    Dai, Shidong
    Li, Xing
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4400 - 4403
  • [9] ICMP traceback with cumulative path, an efficient solution for IP traceback
    Lee, HCJ
    Thing, VLL
    Xu, Y
    Ma, M
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 124 - 135
  • [10] Analysis of IP traceback systems
    Bhaskaran, V. Murali
    Natarajan, A. M.
    Sivanandam, S. N.
    2006 INTERNATIONAL SYMPOSIUM ON AD HOC AND UBIQUITOUS COMPUTING, 2007, : 119 - +