Coloring networks for attacker identification and response

被引:4
|
作者
Sairam, Ashok Singh [1 ]
Roy, Sangita [1 ]
Sahay, Rishikesh [1 ]
机构
[1] IIT Patna, Dept Comp Sci & Engn, Patna, Bihar, India
关键词
packet marking; attack signature; star coloring; IP traceback; dynamic attack response; IP TRACEBACK; INTERNET;
D O I
10.1002/sec.1022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network-based attacks such as denial-of-service attacks are usually performed by spoofing the source IP address. Packet marking techniques are used to trace such attackers as close as possible to their source. A packet mark consists of some traceback information pertaining to a router being embedded in the IP packet header. In this work, we use the concept of star coloring to assign reusable colors (marks) to routers but at the same time limits false positives and false negatives. The proposed scheme minimizes the bit space required for marking in the IP header. We introduce the concept of path identifier, to identify an attack path. The path identifiers are used to provide an elegant solution to collect attack packets in the midst of a distributed denial-of-service attack and then traceback. Although identifying the attacker is crucial to institute protection measures against future attacks, it cannot mitigate the effects of an ongoing attack. We establish the use of path identifiers, to filter packets during an ongoing attack. We present a validation of the proposed techniques in an emulated environment using real attack traffic. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:751 / 768
页数:18
相关论文
共 50 条
  • [21] Coloring large complex networks
    Rossi, Ryan A.
    Ahmed, Nesreen K.
    SOCIAL NETWORK ANALYSIS AND MINING, 2014, 4 (01) : 1 - 37
  • [22] A general defender-attacker risk model for networks
    Al Mannai, W. I.
    Lewis, T. G.
    JOURNAL OF RISK FINANCE, 2008, 9 (03) : 244 - 261
  • [23] Coloring unstructured radio networks
    Moscibroda, Thomas
    Wattenhofer, Roger
    DISTRIBUTED COMPUTING, 2008, 21 (04) : 271 - 284
  • [24] Dominated coloring in certain networks
    Poonkuzhali, S.
    Jayagopal, R.
    SOFT COMPUTING, 2024, 28 (11-12) : 7003 - 7011
  • [25] Coloring unstructured radio networks
    Thomas Moscibroda
    Roger Wattenhofer
    Distributed Computing, 2008, 21 : 271 - 284
  • [26] Lightweight Coloring and Desynchronization for Networks
    Motskin, Arik
    Roughgarden, Tim
    Skraba, Primoz
    Guibas, Leonidas
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 2383 - 2391
  • [27] Learn to Coloring: Fast Response to Perturbation in UAV-Assisted Disaster Relief Networks
    Wang, Bowen
    Sun, Yanjing
    Zhao, Nan
    Gui, Guan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (03) : 3505 - 3509
  • [28] ARA-MAC: Attacker Identification Using Logistic Regression
    Shukla, Piyush
    Rai, Rishi
    2017 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN SIGNAL PROCESSING AND EMBEDDED SYSTEMS (RISE), 2017, : 124 - 128
  • [29] Face morphing attack detection and attacker identification based on a watchlist
    Peng, Fei
    Qin, Le
    Long, Min
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2022, 107
  • [30] Diversity Coloring for information storage in networks
    Jiang, A
    Bruck, J
    ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, : 381 - 381