2012 ◽  
Vol 468-471 ◽  
pp. 2002-2009
Author(s):  
Yan Hua Wang ◽  
Xiu Xu

Denial of Service Attack is a very important security event in the current network security .Address the problem of DDoS Network Attacks ,researchers have proposed a variety of tracking programs against Denial of Service Attack .Such as IP tracking program, packet marking ,logging ,connection test ,ICMP tracking ,covering networks ,and so on .The marked storage space has been expended by the use of authentication machnism of adaptive probability packet .Increasing marks could store the hash value of the IP addresses of the head node .With the selection of the mentioned two methods above ,the quantity of needed packet while reconstructing the path has been decreased .And ultimately ,the propose of decreasing the rate of false positives and the computational complexity ,as well as improving the convergence and security have been reached.


Author(s):  
Omoniyi Wale Salami ◽  
Imeh Jarlath Umoh ◽  
Emmanuel Adewale Adedokun ◽  
Muhammed Bashir Muazu

 Denial of service attack and its variants are the largest ravaging network problems. They are used to cause damage to network by disrupting its services in order to harm a business or organization. Flash event is a network phenomenon that causes surge in normal network flow due to sudden increase in number of network users, To curtail the menace of the Denial of service attack it is pertinent to expose the perpetrator and take appropriate action against it. Internet protocol traceback is a network forensic tool that is used to identify source of an Internet protocol packet. Most of presently available Internet protocol traceback tools that are based on bio-inspired algorithm employ flow-based search method for tracing source of a Denial of service attack without facility to differentiate flash event from the attack. Surge in network due to flash event can mislead such a traceback tool that uses flow-based search. This work present a solution that uses hop-by-hop search with an incorporated discrimination policy implemented by shark smell optimization algorithm to differentiate the attack traffic from other traffics. It was tested on performance and convergence against an existing bio-inspired traceback tool that uses flow-base method and yielded outstanding results in all the tests


2005 ◽  
Vol 9 (4) ◽  
pp. 363-365 ◽  
Author(s):  
A. Shevtekar ◽  
K. Anantharam ◽  
N. Ansari

Sign in / Sign up

Export Citation Format

Share Document