Coloring networks for attacker identification and response

被引:4
|
作者
Sairam, Ashok Singh [1 ]
Roy, Sangita [1 ]
Sahay, Rishikesh [1 ]
机构
[1] IIT Patna, Dept Comp Sci & Engn, Patna, Bihar, India
关键词
packet marking; attack signature; star coloring; IP traceback; dynamic attack response; IP TRACEBACK; INTERNET;
D O I
10.1002/sec.1022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network-based attacks such as denial-of-service attacks are usually performed by spoofing the source IP address. Packet marking techniques are used to trace such attackers as close as possible to their source. A packet mark consists of some traceback information pertaining to a router being embedded in the IP packet header. In this work, we use the concept of star coloring to assign reusable colors (marks) to routers but at the same time limits false positives and false negatives. The proposed scheme minimizes the bit space required for marking in the IP header. We introduce the concept of path identifier, to identify an attack path. The path identifiers are used to provide an elegant solution to collect attack packets in the midst of a distributed denial-of-service attack and then traceback. Although identifying the attacker is crucial to institute protection measures against future attacks, it cannot mitigate the effects of an ongoing attack. We establish the use of path identifiers, to filter packets during an ongoing attack. We present a validation of the proposed techniques in an emulated environment using real attack traffic. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:751 / 768
页数:18
相关论文
共 50 条
  • [1] Viden: Attacker Identification on In-Vehicle Networks
    Cho, Kyong-Tak
    Shin, Kang G.
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1109 - 1123
  • [2] Attacker Identification and Intrusion Detection for In-Vehicle Networks
    Ning, Jing
    Wang, Jiadai
    Liu, Jiajia
    Kato, Nei
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (11) : 1927 - 1930
  • [3] An Experimental Study Towards Attacker Identification in Automotive Networks
    Ning, Jing
    Liu, Jiajia
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [4] Message dropping attacks in overlay networks: Attack detection and attacker identification
    Xie, Liang
    Zhu, Sencun
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (03)
  • [5] Message dropping attacks in overlay networks: Attack detection and attacker identification
    Xie, Liang
    Zhu, Sencun
    2006 SECURECOMM AND WORKSHOPS, 2006, : 56 - +
  • [6] DAISS: Design of an Attacker Identification Scheme in CoAP Request/Response Spoofing
    Ray, Dipojjwal
    Bhale, Pradeepkumar
    Biswas, Santosh
    Nandi, Sukumar
    Mitra, Pinaki
    2021 IEEE REGION 10 CONFERENCE (TENCON 2021), 2021, : 941 - 946
  • [7] Attacker Models for Wireless Sensor Networks
    Benenson, Zinaida
    Blass, Erik-Oliver
    Freiling, Felix
    IT-INFORMATION TECHNOLOGY, 2010, 52 (06): : 320 - 324
  • [8] Dataset Selection for Attacker Group Identification Methods
    Pavlov, Artem
    Voloshina, Natalia
    30TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION FRUCT, 2021, : 171 - 176
  • [9] The Art of Defense: Letting Networks Fool the Attacker
    Zhang, Jinlai
    Dong, Yinpeng
    Kuang, Minchi
    Liu, Binbin
    Ouyang, Bo
    Zhu, Jihong
    Wang, Houqing
    Meng, Yanmei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3267 - 3276
  • [10] Insider attacker detection in wireless sensor networks
    Liu, Fang
    Cheng, Xluzhen
    Chen, Dechang
    INFOCOM 2007, VOLS 1-5, 2007, : 1937 - +