Skip to main content
Erschienen in: The Journal of Supercomputing 6/2020

19.03.2018

Feasible DDoS attack source traceback scheme by deterministic multiple packet marking mechanism

verfasst von: S. Suresh, N. Sankar Ram

Erschienen in: The Journal of Supercomputing | Ausgabe 6/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A main purpose of network security is to secure the system and its element parts from illegal access and misuse. Distributed denial of service (DDoS) attack is a crucial risk to the internet. A source traceback is a technology to control each and every computer crime. A feasible DDoS attack source traceback technique based on marking on demand (MOD) scheme is proposed to detect computer attack by using multiple packets for marking coding. In this proposed scheme, the MOD scheme is based on the deterministic multiple packet marking mechanism. Depending upon this finding, the proposed technique basically addresses the scalability issue of existing deterministic packet marking-based traceback schemes and perhaps to traceback to the individual cooperated computers more willingly than the present defined routers of attacking computers. Also, this technique is used to identify the malicious users who form the volume of traffic necessary to reject a service to computer user. To traceback the engaged attack source, there is a need to mark these engaged ingress routers by deterministic multiple packet marking mechanism. Simultaneously, the MOD server reports information of the marks and their connected requesting IP addresses. Once DDoS attack is proved, the victim will acquire attack sources through requesting MOD server by marks refined from attack packets. The confirmed DDoS attack is identified when it is higher than the tested threshold value. In this study, a mathematical model is established to prove the efficiency of the proposed source traceback technique in both real-world experiments and theoretical analysis. Extensive real-world experiments and theoretical analysis show that the proposed technique is efficient and feasible.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yu S, Zhou W, Jia W, Guo S, Xiang Y, Tang F (2012) Discriminating DDoS attacks from flash crowds using flow correlation coefficient. IEEE Trans Parallel Distrib Syst 23(6):794–805 Yu S, Zhou W, Jia W, Guo S, Xiang Y, Tang F (2012) Discriminating DDoS attacks from flash crowds using flow correlation coefficient. IEEE Trans Parallel Distrib Syst 23(6):794–805
2.
Zurück zum Zitat Yu S, Tian Y, Guo S, Wu D (2014) Can we beat DDoS attacks in cloud? IEEE Trans Parallel Distrib Syst 25(9):2245–2254 Yu S, Tian Y, Guo S, Wu D (2014) Can we beat DDoS attacks in cloud? IEEE Trans Parallel Distrib Syst 25(9):2245–2254
3.
Zurück zum Zitat Yu S, Zhou W, Doss R, Jia W (2011) Traceback of DDoS attacks using entropy variations. IEEE Trans Parallel Distrib Syst 22(3):412–425 Yu S, Zhou W, Doss R, Jia W (2011) Traceback of DDoS attacks using entropy variations. IEEE Trans Parallel Distrib Syst 22(3):412–425
4.
Zurück zum Zitat Kaur S, Kumar R, Gopal G (2016) DDOS attacks: trends, challenges and possible solutions. Int J Sci Res Dev 4(04):1225–1232 Kaur S, Kumar R, Gopal G (2016) DDOS attacks: trends, challenges and possible solutions. Int J Sci Res Dev 4(04):1225–1232
5.
Zurück zum Zitat Belenky A, Ansari N (2003) IP traceback with deterministic packet marking. IEEE Commun Lett 7(4):162–164 Belenky A, Ansari N (2003) IP traceback with deterministic packet marking. IEEE Commun Lett 7(4):162–164
6.
Zurück zum Zitat Revathi A, Vijayalakshmi J, Robin CRR (2017) An approach to traceback the IP packets dynamically in DDoS attack. Int J Latest Trends Eng Technol Special Issue NCRTCC, 026–031 Revathi A, Vijayalakshmi J, Robin CRR (2017) An approach to traceback the IP packets dynamically in DDoS attack. Int J Latest Trends Eng Technol Special Issue NCRTCC, 026–031
7.
Zurück zum Zitat Yu S, Doss R, Zhou W (2008) Information theory based detection against network behavior mimicking DDoS attacks. IEEE Commun Lett 12(4):319–321 Yu S, Doss R, Zhou W (2008) Information theory based detection against network behavior mimicking DDoS attacks. IEEE Commun Lett 12(4):319–321
8.
Zurück zum Zitat Yu S, Guo S, Stojmenovic I (2015) Fool me if you can: mimicking attacks and anti-attacks in cyberspace. IEEE Trans Comput 64(1):139–151MathSciNetMATH Yu S, Guo S, Stojmenovic I (2015) Fool me if you can: mimicking attacks and anti-attacks in cyberspace. IEEE Trans Comput 64(1):139–151MathSciNetMATH
9.
Zurück zum Zitat Yu S, Zhou W, Guo S, Guo M (2016) A feasible IP traceback framework through dynamic deterministic packet marking. IEEE Trans Comput 65(5):1418–1427MathSciNetMATH Yu S, Zhou W, Guo S, Guo M (2016) A feasible IP traceback framework through dynamic deterministic packet marking. IEEE Trans Comput 65(5):1418–1427MathSciNetMATH
10.
Zurück zum Zitat Belenky A, Ansari N (2007) On deterministic packet marking. Comput Netw 52(10):2677–2700MATH Belenky A, Ansari N (2007) On deterministic packet marking. Comput Netw 52(10):2677–2700MATH
11.
Zurück zum Zitat Xiang Y, Zhou W, Guo M (2008) Flexible deterministic packet marking: an IP traceback system to find the real source of attacks. IEEE Trans Parallel Distrib Syst 20(4):567–580 Xiang Y, Zhou W, Guo M (2008) Flexible deterministic packet marking: an IP traceback system to find the real source of attacks. IEEE Trans Parallel Distrib Syst 20(4):567–580
12.
Zurück zum Zitat Liu J, Lee Z, Chung Y (2007) Dynamic probabilistic packet marking for efficient IP traceback. Comput Netw 51:866–882MATH Liu J, Lee Z, Chung Y (2007) Dynamic probabilistic packet marking for efficient IP traceback. Comput Netw 51:866–882MATH
13.
Zurück zum Zitat John A, Sivakumar T (2009) DDoS: survey of traceback methods. Int J Recent Trends Eng 1(2):241–245 John A, Sivakumar T (2009) DDoS: survey of traceback methods. Int J Recent Trends Eng 1(2):241–245
14.
Zurück zum Zitat Yu S et al (2015) A feasible IP traceback framework through dynamic deterministic packet marking. IEEE Trans Comput 65:1–11MathSciNet Yu S et al (2015) A feasible IP traceback framework through dynamic deterministic packet marking. IEEE Trans Comput 65:1–11MathSciNet
15.
Zurück zum Zitat Parameswari M, Sukumaran S (2016) Dynamic detection and protection mechanism against distributed denial of service attacks using fuzzy logic. Int J Appl Eng Res 4(7):5332–5337 Parameswari M, Sukumaran S (2016) Dynamic detection and protection mechanism against distributed denial of service attacks using fuzzy logic. Int J Appl Eng Res 4(7):5332–5337
Metadaten
Titel
Feasible DDoS attack source traceback scheme by deterministic multiple packet marking mechanism
verfasst von
S. Suresh
N. Sankar Ram
Publikationsdatum
19.03.2018
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 6/2020
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-018-2323-8

Weitere Artikel der Ausgabe 6/2020

The Journal of Supercomputing 6/2020 Zur Ausgabe