ISP Traceback - Attack Path Detection

被引:0
|
作者
Stelte, Bjoern [1 ]
机构
[1] Univ Bundeswehr Munchen, D-85577 Neubiberg, Germany
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, a novel IP traceback method is presented which is able to identify the ISP network of an attacker. This approach is motivated mainly by the disadvantages of known methods and by the importance of the ISP in its role as responsible for the attack mitigation. The developed traceback approach is characterized primarily by the fact that it is very efficient compared to other methods, and that ISPs across and legitimate participants are only minimally affected. The basis for this method is that the victim of an attack can identify the ISP from whose network the attacks originate based on markers set in an extended BGP protocol header. Using this information, the responsible ISP can be contacted and asked to block the identified attacker in his network.
引用
收藏
页码:363 / 364
页数:2
相关论文
共 50 条
  • [41] All-Packets-Based Multi-Rate DDoS Attack Detection Method in ISP Layer
    Liu, Xinqian
    Ren, Jiadong
    He, Haitao
    Zhang, Bing
    Wang, Qian
    Zheng, Zhangqi
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [42] E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric
    Bhuyan, Monowar H.
    Bhattacharyya, D. K.
    Kalita, J. K.
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3251 - 3270
  • [43] Spanning tree search model to traceback DDoS attack using netflow
    Lee, M
    Jung, S
    Kwon, Y
    Kim, K
    Moon, J
    Byeon, O
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 330 - 333
  • [44] Improved technique of IP address fragmentation strategies for DoS attack traceback
    Kim, Byung-Ryong
    Kim, Ki-Chang
    COMPUTER SCIENCE - THEORY AND APPLICATIONS, 2006, 3967 : 427 - 437
  • [45] The Traceback Method about DoS Attack in Open Grid Computing Environment
    Lee, Seoung-Hyeon
    Chae, Cheol-Joo
    Lee, Deok-Gyu
    Han, Jong-Wook
    Lee, Jae-Kwang
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 389 - +
  • [46] Identification of the Real Source of DDOS Attack by FDPM in IP Traceback System
    Barokar, Gaurav D.
    Mahalle, V. S.
    UKSIM-AMSS EIGHTH EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS 2014), 2014, : 392 - 396
  • [47] Analysis of Cyber Attack Traceback Techniques from the Perspective of Network Forensics
    Liu X.-H.
    Ding L.-P.
    Zheng T.
    Wu J.-Z.
    Li Y.-F.
    Ruan Jian Xue Bao/Journal of Software, 2021, 32 (01): : 194 - 217
  • [48] TOPO: A topology-aware single packet attack traceback scheme
    Zhang, Linfeng
    Guan, Yong
    2006 SECURECOMM AND WORKSHOPS, 2006, : 269 - +
  • [49] Traceback-based Bloomfilter IPS in Defending SYN flooding attack
    Tang, Huan-rong
    Xu, Chao
    Luo, Xin-gao
    Yang, Jian-quan Ou
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4589 - 4594
  • [50] Detection of Wormhole Attack and Secure Path Selection in Wireless Sensor Network
    N. Tamilarasi
    S. G. Santhi
    Wireless Personal Communications, 2020, 114 : 329 - 345