ISP Traceback - Attack Path Detection

被引:0
|
作者
Stelte, Bjoern [1 ]
机构
[1] Univ Bundeswehr Munchen, D-85577 Neubiberg, Germany
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, a novel IP traceback method is presented which is able to identify the ISP network of an attacker. This approach is motivated mainly by the disadvantages of known methods and by the importance of the ISP in its role as responsible for the attack mitigation. The developed traceback approach is characterized primarily by the fact that it is very efficient compared to other methods, and that ISPs across and legitimate participants are only minimally affected. The basis for this method is that the victim of an attack can identify the ISP from whose network the attacks originate based on markers set in an extended BGP protocol header. Using this information, the responsible ISP can be contacted and asked to block the identified attacker in his network.
引用
收藏
页码:363 / 364
页数:2
相关论文
共 50 条
  • [21] Catabolism attack and Anabolism defense: A novel attack and traceback mechanism in Opportunistic Networks
    Alajeely, Majeed
    Doss, Robin
    Ahmad, Asma'a
    Mak-Hau, Vicky
    COMPUTER COMMUNICATIONS, 2015, 71 : 111 - 118
  • [22] Autonomous System Based Traceback Mechanism for DDoS Attack
    Rajam, V. K. Soundar
    Selvaram, G.
    PradeepKumar, M.
    Shalinie, S. Mercy
    2013 FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2013, : 164 - 171
  • [23] Architecture for multi-stage network attack traceback
    Strayer, WT
    Jones, CE
    Schwartz, BI
    Mikkelson, J
    Livadas, C
    LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2005, : 776 - 783
  • [24] Research on IP Traceback Technology Based on DDoS Attack
    Tian Zhuo
    Li Baicheng
    MODERN TECHNOLOGIES IN MATERIALS, MECHANICS AND INTELLIGENT SYSTEMS, 2014, 1049 : 1820 - 1823
  • [25] Technical, legal and societal challenges to automated attack traceback
    Johns Hopkins Applied Physics Laboratory, United States
    不详
    IT Professional, 2002, 4 (03) : 12 - 18
  • [26] UDP based IP Traceback for Flooding DDoS Attack
    Murugesan, Vijayalakshmi
    Selvaraj, MercyShalinie
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (01) : 103 - 111
  • [27] A novel protocol for IP traceback to detect DDoS attack
    Meena, Yogesh Kumar
    Trivedi, Aditya
    International Journal of Computer Science Issues, 2012, 9 (4 4-1): : 284 - 291
  • [28] A new scheme for IP traceback under DoS attack
    Tian, HT
    Huang, LS
    Lei, YF
    Chen, GL
    PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 189 - 193
  • [29] Attack Source Traceback based on Stable Topology in MANET
    Zhang, Lili
    Jing, Yinan
    Wang, Xueping
    Cao, Xiu
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [30] Parallel path selection mechanism for DDoS attack detection
    Li, Man
    Zhou, Huachun
    Deng, Shuangxing
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 230