Traceback Model for Identifying Sources of Distributed Attacks in Real Time

Locating sources of distributed attack is time-consuming; attackers are identified long after the attack is completed. This paper proposes a trackback model for identifying attackers and locating their distributed sources in real time. Attackers are identified by monitoring violations of malicious e...

詳細記述

保存先:
書誌詳細
主要な著者: Ahmed, Abdulghani Ali, Sadiq, Ali Safa, Mohamad Fadli, Zolkipli
フォーマット: 論文
言語:English
出版事項: Wiley 2016
主題:
オンライン・アクセス:http://umpir.ump.edu.my/id/eprint/12717/1/Traceback%20Model%20for%20Identifying%20Sources%20of%20Distributed%20Attacks%20In%20Real%20Time.pdf
http://umpir.ump.edu.my/id/eprint/12717/
http://dx.doi.org/10.1002/sec.1476
タグ: タグ追加
タグなし, このレコードへの初めてのタグを付けませんか!
id my.ump.umpir.12717
record_format eprints
spelling my.ump.umpir.127172018-03-30T08:14:28Z http://umpir.ump.edu.my/id/eprint/12717/ Traceback Model for Identifying Sources of Distributed Attacks in Real Time Ahmed, Abdulghani Ali Sadiq, Ali Safa Mohamad Fadli, Zolkipli QA Mathematics QA75 Electronic computers. Computer science Locating sources of distributed attack is time-consuming; attackers are identified long after the attack is completed. This paper proposes a trackback model for identifying attackers and locating their distributed sources in real time. Attackers are identified by monitoring violations of malicious end users on their bandwidth shares predefined in the service level agreement. Then, active connections of the malicious users are investigated to locate the host machines used as distributed sources of attack traffic. Mathematical model and simulation results demonstrate that the proposed model can reduce the required time for identifying malicious users and locating host machines used as the actual sources of attack packets Wiley 2016 Article PeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/12717/1/Traceback%20Model%20for%20Identifying%20Sources%20of%20Distributed%20Attacks%20In%20Real%20Time.pdf Ahmed, Abdulghani Ali and Sadiq, Ali Safa and Mohamad Fadli, Zolkipli (2016) Traceback Model for Identifying Sources of Distributed Attacks in Real Time. Security and Communication Networks, 9 (13). pp. 2173-2185. ISSN 1939-0122. (Published) http://dx.doi.org/10.1002/sec.1476 DOI: 10.1002/sec.1476
institution Universiti Malaysia Pahang Al-Sultan Abdullah
building UMPSA Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Pahang Al-Sultan Abdullah
content_source UMPSA Institutional Repository
url_provider http://umpir.ump.edu.my/
language English
topic QA Mathematics
QA75 Electronic computers. Computer science
spellingShingle QA Mathematics
QA75 Electronic computers. Computer science
Ahmed, Abdulghani Ali
Sadiq, Ali Safa
Mohamad Fadli, Zolkipli
Traceback Model for Identifying Sources of Distributed Attacks in Real Time
description Locating sources of distributed attack is time-consuming; attackers are identified long after the attack is completed. This paper proposes a trackback model for identifying attackers and locating their distributed sources in real time. Attackers are identified by monitoring violations of malicious end users on their bandwidth shares predefined in the service level agreement. Then, active connections of the malicious users are investigated to locate the host machines used as distributed sources of attack traffic. Mathematical model and simulation results demonstrate that the proposed model can reduce the required time for identifying malicious users and locating host machines used as the actual sources of attack packets
format Article
author Ahmed, Abdulghani Ali
Sadiq, Ali Safa
Mohamad Fadli, Zolkipli
author_facet Ahmed, Abdulghani Ali
Sadiq, Ali Safa
Mohamad Fadli, Zolkipli
author_sort Ahmed, Abdulghani Ali
title Traceback Model for Identifying Sources of Distributed Attacks in Real Time
title_short Traceback Model for Identifying Sources of Distributed Attacks in Real Time
title_full Traceback Model for Identifying Sources of Distributed Attacks in Real Time
title_fullStr Traceback Model for Identifying Sources of Distributed Attacks in Real Time
title_full_unstemmed Traceback Model for Identifying Sources of Distributed Attacks in Real Time
title_sort traceback model for identifying sources of distributed attacks in real time
publisher Wiley
publishDate 2016
url http://umpir.ump.edu.my/id/eprint/12717/1/Traceback%20Model%20for%20Identifying%20Sources%20of%20Distributed%20Attacks%20In%20Real%20Time.pdf
http://umpir.ump.edu.my/id/eprint/12717/
http://dx.doi.org/10.1002/sec.1476
_version_ 1822917448594096128
score 13.250246