IP traceback techniques for intrusion tracking

被引:0
|
作者
Nur, MM [1 ]
Syed, MR [1 ]
Bignall, RJ [1 ]
机构
[1] Minnesota State Univ, Dept Comp & Informat Sci, Mankato, MN 56001 USA
来源
8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS | 2004年
关键词
intrusion tracking; IP traceback; denial of service attack; packet marking; messaging; logging; link testing;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Denial of Service (DoS) is currently considered to be one of the most common types of Internet security attack. DoS attacks usually destroy the service-providing ability of web servers by consuming their resources, thus preventing legitimate users from receiving the expected services from them. Different access control and intrusion detection technologies have been developed for preventing and detecting these kinds of network attacks. Unfortunately, DoS attackers can hide their true identity by forging the IT address of attack packets, Therefore, in addition to detection, IP traceback techniques are needed in order to identify the true origin of the attack packets and to provide the capability to take action against the attackers. This paper examines some proposed IP traceback techniques and discusses their feasibility and limitations.
引用
收藏
页码:384 / 388
页数:5
相关论文
共 50 条
  • [31] IP Traceback in Star Colored Networks
    Roy, Sangita
    Singh, Anurag
    Sairam, Ashok Singh
    2013 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2013,
  • [32] A Survey of Modern IP Traceback Methodologies
    Balyk, Anatolii
    Iatsykovska, Uliana
    Karpinski, Mikolaj
    Khokhlachova, Yuliia
    Shaikhanova, Aigul
    Korkishko, Lesia
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOLS 1-2, 2015, : 484 - 488
  • [33] Identifying the Attack Source by IP Traceback
    Nalavade, K. C.
    Meshram, B. B.
    INFORMATION AND COMMUNICATION TECHNOLOGIES, 2010, 101 : 292 - 296
  • [34] Efficient technique for fast IP traceback
    Kim, Byungryong
    COOPERATIVE DESIGN, VISUALIZATION, AND ENGINEERING, PROCEEDINGS, 2006, 4101 : 211 - 218
  • [35] Single-packet IP traceback
    Snoeren, AC
    Partridge, C
    Sanchez, LA
    Jones, CE
    Tchakountio, F
    Schwartz, B
    Kent, ST
    Strayer, WT
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2002, 10 (06) : 721 - 734
  • [36] Hash-based IP traceback
    Snoeren, AC
    Partridge, C
    Sanchez, LA
    Jones, CE
    Tchakountio, F
    Kent, ST
    Strayer, WT
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2001, 31 (04) : 3 - 14
  • [37] An evaluation of different IP traceback approaches
    Kuznetsov, V
    Sandström, H
    Simkin, A
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 37 - 48
  • [38] IP traceback with deterministic packet marking
    Belenky, A
    Ansari, N
    IEEE COMMUNICATIONS LETTERS, 2003, 7 (04) : 162 - 164
  • [39] Cooperative Intrusion Traceback and Response Architecture (CITRA)
    Schnackenberg, D
    Holliday, H
    Smith, R
    Djahandari, K
    Sterne, D
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 56 - 68
  • [40] Advanced and authenticated marking schemes for IP traceback
    Song, DXD
    Perrig, A
    IEEE INFOCOM 2001: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: TWENTY YEARS INTO THE COMMUNICATIONS ODYSSEY, 2001, : 878 - 886