Research on Attack Source Traceback

Article Preview

Abstract:

The existing methods of attack traceback still have many defects, such as input debugging method requires the professional intervention; ICMP traceback message takes up the network bandwidth resources and so on, so a new collaborative network is picked up, based on ant source of ideological attack tracking method. This method is mainly used strategy from ICMP traceback message, that is, data packet attacked is backed-up on the network monitor, and then the scope of the query path information is reduced using the ant colony algorithm, enabling rapid construction of the attack path. Experiments show that the method improves the query speed of tracking information and the accuracy of positioning the source attack.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3644-3647

Citation:

Online since:

August 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Wang-yan, Performance analysis on techniques of tracing network attacks, Comouter Applications and Software, pp.294-297, Feb (2011).

Google Scholar

[2] Lv-junliang and Liu-li, New fragment marking algorithm for IP traceback, Computer Engineering and applications, pp.4-7, March (2010).

Google Scholar

[3] Ling-Guoyuan and Cao-Tianjie, A servey on intrusion detection system, Computer Applications and Software, pp.14-17, March (2009).

Google Scholar

[4] Shi-Zhicai and Xia-Yongxiang, Survey on intrusion detection techniques for high-speed networks, Application Research of Computers, pp.1606-1610, May (2010).

Google Scholar

[5] Xiao-Dan, Yang-Yingjie and Shi-Minjian, Attack traceback method based on collaborative mechanism, Computer Applications, pp.854-858, April (2007).

Google Scholar