Tracing Network Attacks to Their Sources
نویسندگان
چکیده
As the Internet becomes increasingly important as a business infrastructure, the number of attacks on it, especially denial-of-service attacks such as TCP SYN flooding,1 Teardrop,2 and Land,2 grows. Because of the weak security in TCP/IP, we must take responsibility for protecting our own sites against network attacks. Although access-control technologies, such as firewalls, are commonly used to prevent network attacks, they cannot prevent some specific attacks, including TCP SYN flooding. Consequently, more companies are deploying intrusion detection systems (IDS). (See the sidebar, “Technologies for Preventing Network Attacks,” page 23, for a discussion of current access-control and detection systems.) IDSs detect network attacks; however, they do not let us identify the attack source. This is especially problematic with denial-of-service attacks, for example, because the attacker doesn’t need to receive packets from the target host and thus can remain hidden. Several efforts are in progress to develop source-identification technologies to trace packets even when an attacker forges its IP address. In this article, we describe some proposed IP traceback architectures, including our own, which we have implemented in a prototype. In our system, routers log data about traversing packets as well as information about other nodes in the packet’s path.3 We use a distributed management approach to enable tracing across networks with different access policies.
منابع مشابه
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program running on an unknown host, and carried by packets that bear no clues that could be used to determine their originating host. Identifying the source of such an attack requires tracing the packets back to the source hop...
متن کاملTowards Improving an Algebraic Marking Scheme for Tracing DDoS Attacks
Distributed Denial of Service (DDoS ) attacks could be considered as one of the most serious security problems to the Internet today. To locate the sources of the attack packets, we usually need to find the paths through which the attack packets traversed from the sources to the victim. In this paper, we identify the weaknesses of an existing algebraic marking scheme for tracing DDoS attacks, a...
متن کاملIP Tracing and Active Network Response
Active security is mainly concerned with performing one or more security functions when a host in a communication network is subject to an attack. Such security functions include appropriate actions against attackers. To properly afford active security actions a set of software subsystems should be integrated together so that they can automatically detect and appropriately address any vulnerabi...
متن کاملSimulation of the Combined Method
DDoS attacks have become one of the most dangerous issues in the Internet today. Because of these attacks, legitimate users can not access the resources they need. In [1] authors proposed a combined method for tracing and blocking the sources of DDoS-attacks. The essence of the method is that each router marks the network packet that passes through it using a random hash function from the set. ...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Internet Computing
دوره 6 شماره
صفحات -
تاریخ انتشار 2002