Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
Classification and comparison of IP traceback techniques for DoS/DDoS/DRDoS defence
International Journal of Advanced Intelligence Paradigms (IJAIP), Volume 29, Issue 1Pages 46–71https://doi.org/10.1504/ijaip.2024.141525The invention of the internet environment has increased the speed of data transmission, however, the attacks in this environment are growing exponentially. Furthermore, identifying the source of the attacks is very difficult due to the vibrant and ...
- research-articleJanuary 2023
A novel traceback model for DDoS attacks using modified Floyd-Warshall algorithm
International Journal of Information and Computer Security (IJICS), Volume 20, Issue 1-2Pages 84–103https://doi.org/10.1504/ijics.2023.128003Distributed denial of service, DDoS, attacks are drastically increasing, therefore, they cause serious threats for information networks. This paper proposes, for the first time, the use of a graph theoretic approach to exploit the entropy techniques for ...
- research-articleJuly 2019
Towards core-stateless fairness on multiple timescales
ANRW '19: Proceedings of the 2019 Applied Networking Research WorkshopPages 30–36https://doi.org/10.1145/3340301.3341124Extending fairness to multiple timescales creates the right incentives for users and provides better QoE for short sessions, e.g. for web page download. In this paper, we show how to define and implement multi-timescale fairness among flows independently ...
- research-articleOctober 2017
Unmasking of source identity, a step beyond in cyber forensic
SIN '17: Proceedings of the 10th International Conference on Security of Information and NetworksPages 157–164https://doi.org/10.1145/3136825.3136870Increasing number of digital crime raises the need of investigation where the most critical step is to collect the evidences of attack and find the real origin of the attack. However the attacker can easily spoof the source IP address and hence the ...
- ArticleSeptember 2015
Network Attack Detection and Mitigation
SASOW '15: Proceedings of the 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems WorkshopsPages 168–173https://doi.org/10.1109/SASOW.2015.33Resource exhaustion attacks or denial of service attacks (DoS) have emerged as a major way to compromise the availability of servers and interrupt legitimate online services. IP trace back refers to the problem of identifying the source of such attacks. ...
-
- articleMarch 2015
Coloring networks for attacker identification and response
Security and Communication Networks (SACN), Volume 8, Issue 5Pages 751–768https://doi.org/10.1002/sec.1022Network-based attacks such as denial-of-service attacks are usually performed by spoofing the source IP address. Packet marking techniques are used to trace such attackers as close as possible to their source. A packet mark consists of some traceback ...
- ArticleOctober 2014
Identification of the Real Source of DDOS Attack by FDPM in IP Traceback System
EMS '14: Proceedings of the 2014 European Modelling SymposiumPages 392–396https://doi.org/10.1109/EMS.2014.48Internet Protocol (IP) trace back is the technology to give security to internet and secure from the internet crime. IP trace back system is also called as Flexible Deterministic Packet Marking (FDPM) which builds such a defense mechanism which has ...
- ArticleNovember 2012
Eagle Eyes: Protocol Independent Packet Marking Scheme to Filter Attack Packets and Reduce Collateral Damage During Flooding Based DoS and DDoS Attacks
ICCCT '12: Proceedings of the 2012 Third International Conference on Computer and Communication TechnologyPages 141–146https://doi.org/10.1109/ICCCT.2012.35Defences against Denial and Distributed Denial of Service (DDoS) attacks commonly responds to flooding by dropping excess traffic. Such rate limiting schemes drop all excess-traffic when the request arrival rate goes above a certain empirically ...
- ArticleOctober 2011
Single-Packet IP Traceback with Less Logging
IIH-MSP '11: Proceedings of the 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal ProcessingPages 97–100https://doi.org/10.1109/IIHMSP.2011.89Currently, the main threats of network security are coming from hacker intrusion, deny of service (DoS), computer virus, worm, spam, malicious code and sniffer because there are many weaknesses in the original design of IPv4. One is that attackers could ...
- articleSeptember 2011
Traceback in wireless sensor networks with packet marking and logging
Frontiers of Computer Science in China (SPFCSC), Volume 5, Issue 3Pages 308–315https://doi.org/10.1007/s11704-011-0361-yIn a hostile environment, sensor nodes may be compromised and then be used to launch various attacks. One severe attack is false data injection which is becoming a serious threat to wireless sensor networks. An attacker uses the compromised node to ...
- ArticleMay 2011
Network Forensic Evidence Acquisition (NFEA) with Packet Marking
ISPAW '11: Proceedings of the 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications WorkshopsPages 388–393https://doi.org/10.1109/ISPAW.2011.27Internet crimes such as DDoS attack have seriously affected the businesses that have dependencies on computer networks such as the Internet. However, TCP/IP based networks have no protection against malicious packet modifications and attackers do ...
- articleDecember 2010
A backpressure technique for filtering spoofed traffic at upstream routers
International Journal of Security and Networks (IJSN), Volume 5, Issue 1Pages 3–14https://doi.org/10.1504/IJSN.2010.030718Ever increasing rate of Denial of Service (DoS) attacks presents severe security threats to the internet. In this study, a backpressure scheme to filter DoS attack traffic at the earliest possible is presented. This paper utilises markings stamped in ...
- ArticleJuly 2010
The Research and Application of Improved IP Trace Solutions in Advanced Packet Marking
ISECS '10: Proceedings of the 2010 Third International Symposium on Electronic Commerce and SecurityPages 144–148https://doi.org/10.1109/ISECS.2010.40This article studies a kind of new advanced packet marking method through analyzing the problems existing in traditional advanced packet marking method. This method has made it unnecessary for the victim to know the network topological information of ...
- research-articleApril 2010
A hotspot-based protocol for attack traceback in mobile ad hoc networks
ASIACCS '10: Proceedings of the 5th ACM Symposium on Information, Computer and Communications SecurityPages 333–336https://doi.org/10.1145/1755688.1755733Based on the principle of divide and conquer, in this paper we propose an efficient traceback protocol for mobile ad hoc networks, The protocol is capable of detecting a hotspot where the attacker resides. It works by dividing the forwarding path of ...
- articleApril 2010
A hybrid scheme using packet marking and logging for IP traceback
International Journal of Internet Protocol Technology (IJIPT), Volume 5, Issue 1/2Pages 81–91https://doi.org/10.1504/IJIPT.2010.032617IP traceback is a mechanism for tracing IP packets back to their sources. Tracing mechanisms include packet marking and logging. Log based traceback has the ability to backtrack a single packet by logging each packet at intermediate nodes in the ...
- ArticleFebruary 2010
A survey of IP traceback mechanisms to overcome denial-of-service attacks
ICNVS'10: Proceedings of the 12th international conference on Networking, VLSI and signal processingPages 93–98The technique of IP traceback is used to overcome Denial-of-Service attacks. This paper deals with explaining the two types of IP traceback techniques namely, Packet Marking and Packet Logging which have been proposed earlier. The paper further explains ...
- ArticleOctober 2009
An Active DDoS Defense Model Based on Packet Marking
IWCSE '09: Proceedings of the 2009 Second International Workshop on Computer Science and Engineering - Volume 01Pages 435–438In the light of that the defense against DDoS attacks is difficult, an active DDoS defense model based on packet marking is proposed in this paper. The model is composed of the subsystem of the tracking of the attacks and the subsystem of filtering of ...
- articleJanuary 2009
Collaborative Framework for Detection, Prevention, and Traceback of Flooding Attacks Using Marking and Filtering
Information Security Journal: A Global Perspective (ISJGP), Volume 18, Issue 2Pages 74–86https://doi.org/10.1080/19393550802676071The basis of denial of service (DoS)/distributed DoS (DDoS) attacks lies in overwhelming a victim's computer resources by flooding them with enormous traffic. This is done by compromising multiple systems that send a high volume of traffic. The traffic ...
- research-articleOctober 2008
An open system for transparent firewall authentication and user traffic identification within corporate intranets
SIGITE '08: Proceedings of the 9th ACM SIGITE conference on Information technology educationPages 113–118https://doi.org/10.1145/1414558.1414591Classical firewalls provide network security by matching a network flow's 5-tuple information against user defined packet filters loaded into memory. In today's dynamic network environments where threats can be both outside and inside a network, it is ...
- articleApril 2008
A proposal for new marking scheme with its performance evaluation for IP traceback
Detecting and defeating Denial of Service (DoS) attacks is one of the hardest security problems on IP networks. Furthermore, spoofing of IP packets makes it difficult to combat against and fix such attacks. Packet marking is one of the methods to ...