MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis

نویسندگان

  • Bo-Chao Cheng
  • Guo-Tan Liao
  • Ching-Kai Lin
  • Shih-Chun Hsu
  • Ping-Hai Hsu
  • Jong Hyuk Park
چکیده

A denial-of-service (DoS) / distributed-denial-of-service (DDoS) attack may result in rapid resource depletion along the attack path. For stepping-stone and masquerading techniques typically used in DoS/DDoS attacks such as internet protocol (IP) or Media Access Control (MAC) address spoofing, tracing the intrusion back to the true attacker becomes a challenging task for network security engineers. Although the Internet Engineer Task Force (IETF) has proposed an Internet Control Message Protocol (ICMP) based Traceback solution, it faces severe difficulties in practice in regard to justifying the interoperability of deployed routers as well as the correctness of Traceback with multiple attack paths. This research proposes a novel approach to embed the essence of a management information base (MIB) into iTrace messages, named MIB-ITrace-CP, in order to improve the accuracy and efficiency of the original ICMP-based Traceback. Through our implementations on a Testbed@TWISC platform, we validated our approach and demonstrated the feasibility of practical network forensics.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Single Packet ICMP Traceback Technique using Router Interface

In the modern technological world, with the increasing dependency on Internet the security threats are on the rise. Distributed Denial of Service (DDoS) attack is one of the biggest threats. The attackers tend to exhaust the network resources, while ingeniously hiding their identity, making the defense process extremely difficult. Many researchers have proposed various solutions to traceback th...

متن کامل

ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback

DoS/DDoS attacks constitute one of the major classes of security threats in the Internet today. The attackers usually use IP spoofing to conceal their real location. The current Internet protocols and infrastructure do not provide intrinsic support to traceback the real attack sources. The objective of IP Traceback is to determine the real attack sources, as well as the full path taken by the a...

متن کامل

On design and evaluation of "intention-driven" ICMP traceback

ION Since late 1999, DDoS (Distributed Denial of Service) [1,2,3] attack has drawn many attentions from both research and industry communities. Many potential solutions (e.g., ingress filtering [6,7], packet marking [5,8,9,10,11] or tracing [4], and aggregate-based congestion control or rate limiting) have been proposed to handle this network bandwidth consumption attack. Among them, “ICMP trac...

متن کامل

A Study of Packet Analysis regarding a DoS Attack in WiBro Environments

This paper analyzes the DoS attack traffic on the WiBro network, generates logs and tracebacks the attacker. With attaining the integrity against the packets resulted from the malicious DoS attack, the paper provides the framework to generating forensic data. In the WiBro network environment, the attacker and the victim are the WiBro mobile terminal. The packet analyzers(Cain & Abel, Wireshark ...

متن کامل

Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback

Nearly all network applications rely on the global Internet routing infrastructure to compute routes and deliver packets. Unfortunately, false Internet routes can be maliciously introduced with relative ease into the routing infrastructure. This is because Border Gateway Protocol (BGP), the Internet’s global routing protocol, lacks basic authentication and monitoring functionalities. If false r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012