Traceback Model for Identifying Sources of Distributed Attacks in Real Time
Locating sources of distributed attack is time-consuming; attackers are identified long after the attack is completed. This paper proposes a trackback model for identifying attackers and locating their distributed sources in real time. Attackers are identified by monitoring violations of malicious e...
保存先:
主要な著者: | , , |
---|---|
フォーマット: | 論文 |
言語: | English |
出版事項: |
Wiley
2016
|
主題: | |
オンライン・アクセス: | http://umpir.ump.edu.my/id/eprint/12717/1/Traceback%20Model%20for%20Identifying%20Sources%20of%20Distributed%20Attacks%20In%20Real%20Time.pdf http://umpir.ump.edu.my/id/eprint/12717/ http://dx.doi.org/10.1002/sec.1476 |
タグ: |
タグ追加
タグなし, このレコードへの初めてのタグを付けませんか!
|
id |
my.ump.umpir.12717 |
---|---|
record_format |
eprints |
spelling |
my.ump.umpir.127172018-03-30T08:14:28Z http://umpir.ump.edu.my/id/eprint/12717/ Traceback Model for Identifying Sources of Distributed Attacks in Real Time Ahmed, Abdulghani Ali Sadiq, Ali Safa Mohamad Fadli, Zolkipli QA Mathematics QA75 Electronic computers. Computer science Locating sources of distributed attack is time-consuming; attackers are identified long after the attack is completed. This paper proposes a trackback model for identifying attackers and locating their distributed sources in real time. Attackers are identified by monitoring violations of malicious end users on their bandwidth shares predefined in the service level agreement. Then, active connections of the malicious users are investigated to locate the host machines used as distributed sources of attack traffic. Mathematical model and simulation results demonstrate that the proposed model can reduce the required time for identifying malicious users and locating host machines used as the actual sources of attack packets Wiley 2016 Article PeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/12717/1/Traceback%20Model%20for%20Identifying%20Sources%20of%20Distributed%20Attacks%20In%20Real%20Time.pdf Ahmed, Abdulghani Ali and Sadiq, Ali Safa and Mohamad Fadli, Zolkipli (2016) Traceback Model for Identifying Sources of Distributed Attacks in Real Time. Security and Communication Networks, 9 (13). pp. 2173-2185. ISSN 1939-0122. (Published) http://dx.doi.org/10.1002/sec.1476 DOI: 10.1002/sec.1476 |
institution |
Universiti Malaysia Pahang Al-Sultan Abdullah |
building |
UMPSA Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Pahang Al-Sultan Abdullah |
content_source |
UMPSA Institutional Repository |
url_provider |
http://umpir.ump.edu.my/ |
language |
English |
topic |
QA Mathematics QA75 Electronic computers. Computer science |
spellingShingle |
QA Mathematics QA75 Electronic computers. Computer science Ahmed, Abdulghani Ali Sadiq, Ali Safa Mohamad Fadli, Zolkipli Traceback Model for Identifying Sources of Distributed Attacks in Real Time |
description |
Locating sources of distributed attack is time-consuming; attackers are identified long after the attack is completed. This paper proposes a trackback model for identifying attackers and locating their distributed sources in real time. Attackers are identified by monitoring violations of malicious end users on their bandwidth shares predefined in the service level agreement. Then, active connections of the malicious users are investigated to locate the host machines used as distributed sources of attack traffic. Mathematical model and simulation results demonstrate that the proposed model can reduce the required time for identifying malicious users and locating host machines used as the actual sources of attack packets |
format |
Article |
author |
Ahmed, Abdulghani Ali Sadiq, Ali Safa Mohamad Fadli, Zolkipli |
author_facet |
Ahmed, Abdulghani Ali Sadiq, Ali Safa Mohamad Fadli, Zolkipli |
author_sort |
Ahmed, Abdulghani Ali |
title |
Traceback Model for Identifying Sources of Distributed
Attacks in Real Time |
title_short |
Traceback Model for Identifying Sources of Distributed
Attacks in Real Time |
title_full |
Traceback Model for Identifying Sources of Distributed
Attacks in Real Time |
title_fullStr |
Traceback Model for Identifying Sources of Distributed
Attacks in Real Time |
title_full_unstemmed |
Traceback Model for Identifying Sources of Distributed
Attacks in Real Time |
title_sort |
traceback model for identifying sources of distributed
attacks in real time |
publisher |
Wiley |
publishDate |
2016 |
url |
http://umpir.ump.edu.my/id/eprint/12717/1/Traceback%20Model%20for%20Identifying%20Sources%20of%20Distributed%20Attacks%20In%20Real%20Time.pdf http://umpir.ump.edu.my/id/eprint/12717/ http://dx.doi.org/10.1002/sec.1476 |
_version_ |
1822917448594096128 |
score |
13.250246 |