O. Salami, I. J. Umoh, E. A. Adedokun, M. B. Mu'azu, Lukman Adewale Ajao
{"title":"Efficient Method for Discriminating Flash Event from DoS Attack during Internet Protocol Traceback using Shark Smell Optimization Algorithm","authors":"O. Salami, I. J. Umoh, E. A. Adedokun, M. B. Mu'azu, Lukman Adewale Ajao","doi":"10.1109/NigeriaComputConf45974.2019.8949671","DOIUrl":null,"url":null,"abstract":"Internet Protocol (IP) traceback tool can wrongly identify a Flash event (FE) flow as a Denial of Service (DoS) attack when tracing a DoS attack source because of the symptomatic similarities between them. IP traceback scheme should be able to differentiate FE from DoS attack to avoid higher false error during a DoS attack traceback process. Discrimination policy was introduced into IP traceback scheme to address this challenge, but the discrimination policy may not work effectively when the attack packets from a DoS attack is very large. This work proposed improvement to the discrimination policy implementation by improving the method of the statistical analysis of the attack packets distribution on each node along the path to select a more accurate attack path segment. The results of different tests carried out show significant improvement on the scheme in analyzing very large values of the attack packets discrimination parameters.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"68 4","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949671","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Internet Protocol (IP) traceback tool can wrongly identify a Flash event (FE) flow as a Denial of Service (DoS) attack when tracing a DoS attack source because of the symptomatic similarities between them. IP traceback scheme should be able to differentiate FE from DoS attack to avoid higher false error during a DoS attack traceback process. Discrimination policy was introduced into IP traceback scheme to address this challenge, but the discrimination policy may not work effectively when the attack packets from a DoS attack is very large. This work proposed improvement to the discrimination policy implementation by improving the method of the statistical analysis of the attack packets distribution on each node along the path to select a more accurate attack path segment. The results of different tests carried out show significant improvement on the scheme in analyzing very large values of the attack packets discrimination parameters.