减轻攻击影响的智能模型

Tarek S. Sobh, Essam M. Hamed
{"title":"减轻攻击影响的智能模型","authors":"Tarek S. Sobh, Essam M. Hamed","doi":"10.1109/ICEEC.2004.1374411","DOIUrl":null,"url":null,"abstract":"IP spoofing enables the network attackers to hide their identity while the IP traceback allows victim to identi3 the origin of attackers. Many IP traceback techniques are suggested such as ICMP trace messages, Probabilistic Packet Marking, Hash-based IP Traceback, etc. The aim of this work is topresent an Intelligent Packet Filtering for defending against both the network Denial of Service (DOS) and Distributed Denial of Service (DDoS) attacks. In addition, the proposed model introduces active response mechanism for taking rapid action against attacker. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or “spoofed”, source addresses. Also, this paper presents within the proposed model a tracing approach based on the packet marking.","PeriodicalId":180043,"journal":{"name":"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An intelligent model for mitigating the attack effects\",\"authors\":\"Tarek S. Sobh, Essam M. Hamed\",\"doi\":\"10.1109/ICEEC.2004.1374411\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"IP spoofing enables the network attackers to hide their identity while the IP traceback allows victim to identi3 the origin of attackers. Many IP traceback techniques are suggested such as ICMP trace messages, Probabilistic Packet Marking, Hash-based IP Traceback, etc. The aim of this work is topresent an Intelligent Packet Filtering for defending against both the network Denial of Service (DOS) and Distributed Denial of Service (DDoS) attacks. In addition, the proposed model introduces active response mechanism for taking rapid action against attacker. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or “spoofed”, source addresses. Also, this paper presents within the proposed model a tracing approach based on the packet marking.\",\"PeriodicalId\":180043,\"journal\":{\"name\":\"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.\",\"volume\":\"71 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-09-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEEC.2004.1374411\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEEC.2004.1374411","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

IP欺骗可以使网络攻击者隐藏自己的身份,而IP回溯可以使受害者识别攻击者的来源。提出了许多IP回溯技术,如ICMP跟踪消息、概率分组标记、基于哈希的IP回溯等。这项工作的目的是提出一种智能包过滤,用于防御网络拒绝服务(DOS)和分布式拒绝服务(DDoS)攻击。此外,该模型还引入了主动响应机制,对攻击者采取快速行动。这项工作的动机是拒绝服务攻击的频率和复杂性的增加,以及追踪具有不正确或“欺骗”源地址的数据包的困难。此外,本文还提出了一种基于数据包标记的跟踪方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An intelligent model for mitigating the attack effects
IP spoofing enables the network attackers to hide their identity while the IP traceback allows victim to identi3 the origin of attackers. Many IP traceback techniques are suggested such as ICMP trace messages, Probabilistic Packet Marking, Hash-based IP Traceback, etc. The aim of this work is topresent an Intelligent Packet Filtering for defending against both the network Denial of Service (DOS) and Distributed Denial of Service (DDoS) attacks. In addition, the proposed model introduces active response mechanism for taking rapid action against attacker. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or “spoofed”, source addresses. Also, this paper presents within the proposed model a tracing approach based on the packet marking.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信