Accurate ICMP TraceBack Model under DoS/DDoS Attack

A. Izaddoost, M. Othman, M. Rasid
{"title":"Accurate ICMP TraceBack Model under DoS/DDoS Attack","authors":"A. Izaddoost, M. Othman, M. Rasid","doi":"10.1109/ADCOM.2007.28","DOIUrl":null,"url":null,"abstract":"One of the most significant current groups of security endangerments in the Internet is DoS/DDoS attacks. The goal of these kinds of attacks is to completely engage available resources so that legitimate users are not able to access a service. Some traceback approach has been proposed to traceback source of attack. One of these methods is Intention-driven iTrace which is the working base of the ICMP traceback. By this method, it will be possible to increase effective ICMP traceback messages which can provide useful information to the victim in tracing source of attack. Reconstructed path to the source of attack by the victim can be done accurately when more effective ICMP traceback messages are generated in critical routers. In this paper, we proposed a model considering incoming packets routed to the victim and by modifying intention-driven iTrace model, we can generate more effective ICMP traceback packets to locate the source of attack more accurately.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"30","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ADCOM.2007.28","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 30

Abstract

One of the most significant current groups of security endangerments in the Internet is DoS/DDoS attacks. The goal of these kinds of attacks is to completely engage available resources so that legitimate users are not able to access a service. Some traceback approach has been proposed to traceback source of attack. One of these methods is Intention-driven iTrace which is the working base of the ICMP traceback. By this method, it will be possible to increase effective ICMP traceback messages which can provide useful information to the victim in tracing source of attack. Reconstructed path to the source of attack by the victim can be done accurately when more effective ICMP traceback messages are generated in critical routers. In this paper, we proposed a model considering incoming packets routed to the victim and by modifying intention-driven iTrace model, we can generate more effective ICMP traceback packets to locate the source of attack more accurately.
DoS/DDoS攻击下精确的ICMP回溯模型
当前互联网上最严重的安全威胁之一是DoS/DDoS攻击。这类攻击的目标是完全占用可用资源,使合法用户无法访问服务。针对攻击源的溯源问题,提出了一些溯源方法。其中一种方法是意图驱动iTrace,它是ICMP回溯的工作基础。通过这种方法,可以增加有效的ICMP回溯消息,为受害者追踪攻击源提供有用的信息。通过在关键路由器上生成更有效的ICMP回溯报文,可以更准确地重建被攻击者到达攻击源的路径。在本文中,我们提出了一个考虑路由到受害者的传入数据包的模型,并通过修改意图驱动的iTrace模型,我们可以生成更有效的ICMP追溯数据包,从而更准确地定位攻击源。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信