ISP Traceback - Attack Path Detection

被引:0
|
作者
Stelte, Bjoern [1 ]
机构
[1] Univ Bundeswehr Munchen, D-85577 Neubiberg, Germany
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, a novel IP traceback method is presented which is able to identify the ISP network of an attacker. This approach is motivated mainly by the disadvantages of known methods and by the importance of the ISP in its role as responsible for the attack mitigation. The developed traceback approach is characterized primarily by the fact that it is very efficient compared to other methods, and that ISPs across and legitimate participants are only minimally affected. The basis for this method is that the victim of an attack can identify the ISP from whose network the attacks originate based on markers set in an extended BGP protocol header. Using this information, the responsible ISP can be contacted and asked to block the identified attacker in his network.
引用
收藏
页码:363 / 364
页数:2
相关论文
共 50 条
  • [31] Space-time encoding scheme for DDoS attack traceback
    Muthuprasanna, M
    Manimaran, G
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1842 - 1846
  • [32] Reflector attack traceback system with pushback based iTrace mechanism
    Lee, HW
    Yun, SH
    Kwon, T
    Kim, JS
    Park, HU
    Oh, NH
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 236 - 248
  • [33] An Effective Traceback Network Attack Procedure for Source Address Verification
    Balraj, Sudhakar
    Leelasankar, Kavisankar
    Ayyanar, Ayyasamy
    Yesudhas, Harold Robinson
    Kumar, Raghvendra
    Long, Hoang Viet
    Hoang Son, Le
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 118 (02) : 1675 - 1696
  • [34] Internet attack traceback - Cross-Validation and pebble tracing
    Yu, Fang
    Lee, David
    2008 IEEE CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, VOLS 1 AND 2, 2008, : 378 - 383
  • [35] Tracking Attack Sources based on Traceback Honeypot for ICS Network
    Abe, Shingo
    Tanaka, Yohei
    Uchida, Yukako
    Horata, Shinichi
    2017 56TH ANNUAL CONFERENCE OF THE SOCIETY OF INSTRUMENT AND CONTROL ENGINEERS OF JAPAN (SICE), 2017, : 717 - 723
  • [36] Accurate ICMP traceback model under DoS/DDoS attack
    Izaddoost, Alireza
    Othman, Mohamed
    Rasid, Mohd Fadlee A.
    ADCOM 2007: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2007, : 441 - +
  • [37] An Effective Traceback Network Attack Procedure for Source Address Verification
    Sudhakar Balraj
    Kavisankar Leelasankar
    Ayyasamy Ayyanar
    Harold Robinson Yesudhas
    Raghvendra Kumar
    Hoang Viet Long
    Le Hoang Son
    Wireless Personal Communications, 2021, 118 : 1675 - 1696
  • [38] Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices
    Yang, Ming-Hour
    Luo, Jia-Ning
    Vijayalakshmi, M.
    Shalinie, S. Mercy
    IEEE ACCESS, 2020, 8 : 201087 - 201097
  • [39] Identification method of attack path based on immune intrusion detection
    Wenhua, Huang
    Geng, Yishuang
    Journal of Networks, 2014, 9 (04) : 964 - 971
  • [40] ISP and egress path selection for multihomed networks
    Dhamdhere, Amogh
    Dovrolis, Constantine
    25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 2314 - 2325