{"title":"减轻攻击影响的智能模型","authors":"Tarek S. Sobh, Essam M. Hamed","doi":"10.1109/ICEEC.2004.1374411","DOIUrl":null,"url":null,"abstract":"IP spoofing enables the network attackers to hide their identity while the IP traceback allows victim to identi3 the origin of attackers. Many IP traceback techniques are suggested such as ICMP trace messages, Probabilistic Packet Marking, Hash-based IP Traceback, etc. The aim of this work is topresent an Intelligent Packet Filtering for defending against both the network Denial of Service (DOS) and Distributed Denial of Service (DDoS) attacks. In addition, the proposed model introduces active response mechanism for taking rapid action against attacker. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or “spoofed”, source addresses. Also, this paper presents within the proposed model a tracing approach based on the packet marking.","PeriodicalId":180043,"journal":{"name":"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An intelligent model for mitigating the attack effects\",\"authors\":\"Tarek S. Sobh, Essam M. Hamed\",\"doi\":\"10.1109/ICEEC.2004.1374411\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"IP spoofing enables the network attackers to hide their identity while the IP traceback allows victim to identi3 the origin of attackers. Many IP traceback techniques are suggested such as ICMP trace messages, Probabilistic Packet Marking, Hash-based IP Traceback, etc. The aim of this work is topresent an Intelligent Packet Filtering for defending against both the network Denial of Service (DOS) and Distributed Denial of Service (DDoS) attacks. In addition, the proposed model introduces active response mechanism for taking rapid action against attacker. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or “spoofed”, source addresses. Also, this paper presents within the proposed model a tracing approach based on the packet marking.\",\"PeriodicalId\":180043,\"journal\":{\"name\":\"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.\",\"volume\":\"71 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-09-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEEC.2004.1374411\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEEC.2004.1374411","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An intelligent model for mitigating the attack effects
IP spoofing enables the network attackers to hide their identity while the IP traceback allows victim to identi3 the origin of attackers. Many IP traceback techniques are suggested such as ICMP trace messages, Probabilistic Packet Marking, Hash-based IP Traceback, etc. The aim of this work is topresent an Intelligent Packet Filtering for defending against both the network Denial of Service (DOS) and Distributed Denial of Service (DDoS) attacks. In addition, the proposed model introduces active response mechanism for taking rapid action against attacker. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or “spoofed”, source addresses. Also, this paper presents within the proposed model a tracing approach based on the packet marking.