Title
Network Attack Detection and Mitigation
Abstract
Resource exhaustion attacks or denial of service attacks (DoS) have emerged as a major way to compromise the availability of servers and interrupt legitimate online services. IP trace back refers to the problem of identifying the source of such attacks. Packet marking is a general technique to trace back attackers. The main idea in packet marking is to insert some trace back data in each packet. The general technique used is to encode the IP address of the edge router into each incoming packet and store it in the 16-bit ID field of the IP packet header. Since information of a 32-bit field is converted to a 16-bit field, irrespective of the hash function used, collisions occur. This means there will be false positives (that is incorrectly identifying a legitimate user as attacker) and the problem will escalate as the size of the network increase. To avoid such collisions, we propose to explore the feasibility of using packet marks that is not directly dependant on the IP address of the packet.
Year
DOI
Venue
2015
10.1109/SASOW.2015.33
SASO Workshops
Keywords
Field
DocType
star coloring, packet marking, distributed star coloring, attack path construction
End-to-end delay,Packet analyzer,Computer science,Martian packet,Computer security,Computer network,Link state packet,Loose Source Routing,IP forwarding,Christmas tree packet,Processing delay,Distributed computing
Conference
Citations 
PageRank 
References 
0
0.34
10
Authors
2
Name
Order
Citations
PageRank
Sangita Roy1113.30
Ashok Singh Sairam24310.83