Probabilistic Route Selection Algorithm to Trace DDoS Attack Traffic Source

Hong-bin Yim, Taewon Kim, Jaeil Jung
{"title":"Probabilistic Route Selection Algorithm to Trace DDoS Attack Traffic Source","authors":"Hong-bin Yim, Taewon Kim, Jaeil Jung","doi":"10.1109/ICISA.2011.5772420","DOIUrl":null,"url":null,"abstract":"DoS(Denial of Service) or DDoS(Distributed DoS) attack is a major threaten and the most difficult problem to solve among many attacks. Moreover, it is very difficult to find a real origin of attackers because DoS/DDoS attacker uses spoofed IP addresses. To solve this problem, we propose a probabilistic route selection algorithm to trace the attacker's real origin. This algorithm uses three types of packets such as an alert packet, an agent packet and a reply agent packet. The alert packet is in use to notify to a victim that DDoS attacks occur. The agent packet is in use to find the attacker's real origin and the reply agent packet is in use to notify to a victim that the agent packet is reached the edge router of the attacker. When source-end detector and victim-end detector detect attacks, the victim-end detector sends the alert packet to the victim. The victim received the alert packet generates the agent packet and sends it to a victim's edge router. The attacker's edge router received the agent packet generates the reply agent packet and send it to the victim. The agent packet and the reply agent packet is forwarded refer to probabilistic packet forwarding table by routers. The probabilistic route selection algorithm runs on the distributed routers and probabilistic packet forwarding table is stored and managed by routers. We simulate for the propose of validation this algorithm by using OPNET14.0 in terms of false positive and required number of packets to trace DDoS attack traffic source.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Information Science and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISA.2011.5772420","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

DoS(Denial of Service) or DDoS(Distributed DoS) attack is a major threaten and the most difficult problem to solve among many attacks. Moreover, it is very difficult to find a real origin of attackers because DoS/DDoS attacker uses spoofed IP addresses. To solve this problem, we propose a probabilistic route selection algorithm to trace the attacker's real origin. This algorithm uses three types of packets such as an alert packet, an agent packet and a reply agent packet. The alert packet is in use to notify to a victim that DDoS attacks occur. The agent packet is in use to find the attacker's real origin and the reply agent packet is in use to notify to a victim that the agent packet is reached the edge router of the attacker. When source-end detector and victim-end detector detect attacks, the victim-end detector sends the alert packet to the victim. The victim received the alert packet generates the agent packet and sends it to a victim's edge router. The attacker's edge router received the agent packet generates the reply agent packet and send it to the victim. The agent packet and the reply agent packet is forwarded refer to probabilistic packet forwarding table by routers. The probabilistic route selection algorithm runs on the distributed routers and probabilistic packet forwarding table is stored and managed by routers. We simulate for the propose of validation this algorithm by using OPNET14.0 in terms of false positive and required number of packets to trace DDoS attack traffic source.
基于概率选路算法的DDoS攻击流量源跟踪
DoS(Denial of Service,拒绝服务)或DDoS(Distributed DoS,分布式拒绝服务)攻击是众多攻击中最主要的威胁和最难解决的问题。此外,由于DoS/DDoS攻击者使用伪造的IP地址,因此很难找到攻击者的真实来源。为了解决这一问题,我们提出了一种概率路由选择算法来追踪攻击者的真实来源。该算法使用三种类型的报文:警报报文、代理报文和应答代理报文。告警报文的作用是在DDoS攻击发生时通知受害者。代理报文用于查找攻击者的真实来源,应答代理报文用于通知受害者代理报文已经到达攻击者的边缘路由器。当源端检测器和受害端检测器检测到攻击时,受害端检测器向受害方发送告警报文。受害者收到告警报文后,生成代理报文发送到受害者的边缘路由器。攻击者的边缘路由器收到代理报文后,生成应答代理报文发送给被攻击者。转发代理报文和应答代理报文参照路由器的概率报文转发表。概率选路算法在分布式路由器上运行,概率报文转发表由路由器存储和管理。我们利用OPNET14.0对验证该算法的提议进行了仿真,从误报和跟踪DDoS攻击流量源所需的数据包数量两个方面进行了仿真。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信