DocumentCode :
614070
Title :
A New Active Path Identification and Filtering Method
Author :
Lin Chen ; Ming He ; Zhihong Liu ; Guilin Cai
Author_Institution :
Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China
fYear :
2013
fDate :
25-28 March 2013
Firstpage :
849
Lastpage :
853
Abstract :
Network attacks based on source address spoofing have become one of the most serious threats to the network security. In this paper, we propose an active source validation scheme based on path identification, referred to as Active SI, which combines the router marking mechanism and the end-system filtering mechanism. In router marking, the router mark each received packet before forward it. In end-system filtering, end-systems send probe packet and perform path learning according to response messages. The learning ability enable end-systems to efficiently verify source address authenticity of received packets. Based on the result of active learning, we establish a trust table which provides support for the subsequent validation. The trust table well solves the imprecision problem of positive learning including such based on probability, threshold and so on. We also present performance analysis of our scheme, and results show that our scheme can efficiently defense against source address spoofing attacks with high filtering precision and good adaptability. Moreover, Active SI support incremental deployment which demonstrates the practicality of our scheme.
Keywords :
Internet; computer crime; information filtering; learning (artificial intelligence); message authentication; probability; telecommunication network routing; telecommunication security; trusted computing; Internet; active SI; active learning; active path identification; active source validation scheme; end-system filtering mechanism; end-systems send probe packet; imprecision problem; learning ability; network attack; network security; network threat; packet forwarding; path learning; positive learning; probability; response message; router marking mechanism; source address authenticity; source address spoofing attack; trust table; Computer crime; Filtering theory; IP networks; Information filters; Performance analysis; Path identification; Source address spoofing; Source validation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference on
Conference_Location :
Barcelona
Print_ISBN :
978-1-4673-6239-9
Electronic_ISBN :
978-0-7695-4952-1
Type :
conf
DOI :
10.1109/WAINA.2013.18
Filename :
6550501
Link To Document :
بازگشت