DocumentCode :
3677728
Title :
Network Attack Detection and Mitigation
Author :
Sangita Roy;Ashok Singh Sairam
Author_Institution :
Dept. of Comput. Sci. &
fYear :
2015
Firstpage :
168
Lastpage :
173
Abstract :
Resource exhaustion attacks or denial of service attacks (DoS) have emerged as a major way to compromise the availability of servers and interrupt legitimate online services. IP trace back refers to the problem of identifying the source of such attacks. Packet marking is a general technique to trace back attackers. The main idea in packet marking is to insert some trace back data in each packet. The general technique used is to encode the IP address of the edge router into each incoming packet and store it in the 16-bit ID field of the IP packet header. Since information of a 32-bit field is converted to a 16-bit field, irrespective of the hash function used, collisions occur. This means there will be false positives (that is incorrectly identifying a legitimate user as attacker) and the problem will escalate as the size of the network increase. To avoid such collisions, we propose to explore the feasibility of using packet marks that is not directly dependant on the IP address of the packet.
Keywords :
"Color","Image color analysis","IP networks","Computer crime","Algorithm design and analysis","Conferences","Servers"
Publisher :
ieee
Conference_Titel :
Self-Adaptive and Self-Organizing Systems Workshops (SASOW), 2015 IEEE International Conference on
Type :
conf
DOI :
10.1109/SASOW.2015.33
Filename :
7306576
Link To Document :
بازگشت