Academic
Publications
Accurate ICMP TraceBack Model under DoS/DDoS Attack

Accurate ICMP TraceBack Model under DoS/DDoS Attack,10.1109/ADCOM.2007.103,Alireza Izaddoost,Mohamed Othman,Mohd Fadlee A Rasid

Accurate ICMP TraceBack Model under DoS/DDoS Attack   (Citations: 3)
BibTex | RIS | RefWorks Download
One of the most significant current groups of security endangerments in the Internet is DoS/DDoS attacks. The goal of these kinds of attacks is to completely engage available resources so that legitimate users are not able to access a service. Some traceback approach has been proposed to traceback source of attack. One of these methods is Intention-driven iTrace which is the working base of the ICMP traceback. By this method, it will be possible to increase effective ICMP traceback messages which can provide useful information to the victim in tracing source of attack. Reconstructed path to the source of attack by the victim can be done accurately when more effective ICMP traceback messages are generated in critical routers. In this paper, we proposed a model considering incoming packets routed to the victim and by modifying intention-driven iTrace model, we can generate more effective ICMP traceback packets to locate the source of attack more accurately.
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
    • ...The following classifications [1] are known as IP traceback methods: link testing [9], Internet Control Message Protocol (ICMP) packet [10][11], message digest [8], and packet marking [1][3][4][5][6][7]...

    Masayuki Okadaet al. 32-bit as Number Based IP Traceback

    • ...Theoretical research has been undertaken on end-to-end IP traceback technologies, for example, a method involving iTrace [4] [5] that generates ICMP traceback messages to convey the forwarding link information of packets, and a packet marking method [6][7] that fills router identification in the packet header, and a digest method [8][9] that records and retrieves the hash values of packets on each router have been proposed...
    • ...There are three active approaches for IP-TBS; namely the iTrace [4][5], packet marking [6][7], and hash-based traceback [8][9]...

    Ken Wakasaet al. Demonstration Experiments Towards Practical IP Traceback on the Intern...

    • ...In [20], MNER is 17% ‐ 19% in old iTrace model and 6% in new proposed model under different network traffic...

    Yi-chi Wuet al. DDoS Detection and Traceback with Decision Tree and Grey Relational An...

Sort by: