Tracing Network Attacks to Their Sources

نویسندگان

  • Tatsuya Baba
  • Shigeyuki Matsuda
چکیده

As the Internet becomes increasingly important as a business infrastructure, the number of attacks on it, especially denial-of-service attacks such as TCP SYN flooding,1 Teardrop,2 and Land,2 grows. Because of the weak security in TCP/IP, we must take responsibility for protecting our own sites against network attacks. Although access-control technologies, such as firewalls, are commonly used to prevent network attacks, they cannot prevent some specific attacks, including TCP SYN flooding. Consequently, more companies are deploying intrusion detection systems (IDS). (See the sidebar, “Technologies for Preventing Network Attacks,” page 23, for a discussion of current access-control and detection systems.) IDSs detect network attacks; however, they do not let us identify the attack source. This is especially problematic with denial-of-service attacks, for example, because the attacker doesn’t need to receive packets from the target host and thus can remain hidden. Several efforts are in progress to develop source-identification technologies to trace packets even when an attacker forges its IP address. In this article, we describe some proposed IP traceback architectures, including our own, which we have implemented in a prototype. In our system, routers log data about traversing packets as well as information about other nodes in the packet’s path.3 We use a distributed management approach to enable tracing across networks with different access policies.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tracing Anonymous Packets to Their Approximate Source

Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program running on an unknown host, and carried by packets that bear no clues that could be used to determine their originating host. Identifying the source of such an attack requires tracing the packets back to the source hop...

متن کامل

Towards Improving an Algebraic Marking Scheme for Tracing DDoS Attacks

Distributed Denial of Service (DDoS ) attacks could be considered as one of the most serious security problems to the Internet today. To locate the sources of the attack packets, we usually need to find the paths through which the attack packets traversed from the sources to the victim. In this paper, we identify the weaknesses of an existing algebraic marking scheme for tracing DDoS attacks, a...

متن کامل

IP Tracing and Active Network Response

Active security is mainly concerned with performing one or more security functions when a host in a communication network is subject to an attack. Such security functions include appropriate actions against attackers. To properly afford active security actions a set of software subsystems should be integrated together so that they can automatically detect and appropriately address any vulnerabi...

متن کامل

Simulation of the Combined Method

DDoS attacks have become one of the most dangerous issues in the Internet today. Because of these attacks, legitimate users can not access the resources they need. In [1] authors proposed a combined method for tracing and blocking the sources of DDoS-attacks. The essence of the method is that each router marks the network packet that passes through it using a random hash function from the set. ...

متن کامل

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Internet Computing

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2002