Skip to main content

Tracing Denial of Service Origin: Ant Colony Approach

  • Conference paper
Applications of Evolutionary Computing (EvoWorkshops 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3907))

Included in the following conference series:

Abstract

Denial-of-Service (DoS) attacks with fake source IP addresses have become a major threat to the Internet. Intrusion detection systems are often used to detect DoS attacks. However, DoS attack packets attempt to exhaust resources, degrading network performance or, even worse, causing network breakdown. The proposed proactive approach is allocating the original attack host(s) issuing the attacks and stopping the malicious traffic, instead of wasting resources on the attack traffic.

Ant colony based traceback approach is presented in this study to identify the DoS attack original source IP address. Instead of creating a new function or processing a high volume of fine-grained data, the proposed IP address traceback approach uses flow level information to identify the origin of a DoS attack.

The proposed method is evaluated through simulation on various network environments. The simulation results show that the proposed method can successfully and efficiently find the DoS attack path in various simulated network environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Computer Security Institute, CSI/FBI Computer Crime and Security Survey (2003), http://www.crime-research.org/news/11.06.2004/423/

  2. Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Network Support for IP Traceback. IEEE/ACM Trans. Networking 9(3), 226–237 (2001)

    Article  Google Scholar 

  3. Song, D., Perrig, A.: Advanced and Authenticated Marking Schemes for IP Traceback. In: Proc. IEEE INFOCOM, pp. 878–886. IEEE CS Press, Los Alamitos (2001)

    Google Scholar 

  4. Soneren, A.C., Partridge, C., Sanchez, L.A., Jones, C.E., Tachakountio, F., Schwartz, B., Kent, S.T., Strayer, W.T.: Single-packet IP Traceback, IEEE/ACM Trans. Networking,  10(6), 721–734 (2002)

    Google Scholar 

  5. Strayer, W.T., Jones, C.E., Tachakountio, F., Schwartz, B., Clements, R.C., Condell, M., Partridge, C.: ”Traceback of Single IP Packets Using SPIE,” Proc. DARPA information Survivability Conference and Exposition– vol. 2 April 22 -24, Washington, DC. pp. 266 (2003)

    Google Scholar 

  6. Upton, G.: Swarm Intelligence, http://www.cs.earlham.edu/~uptongl/project/Swarm_Intelligence.html

  7. Dorigo, M., Maniezzo, V., Colorni, A.: ” The Ant System: An Autocatalytic Optimizing Process,” Technical Report No. 91-016 Revised, Politecnico di Milano, Italy (1991)

    Google Scholar 

  8. Gong, Y.: Detecting Worms and Abnormal Activities with NetFlow, http://www.securityfocus.com/infocus/1796

  9. Scientific Linux, https://www.scientificlinux.org/

  10. Flow-tools information, http://www.splintered.net/sw/flow-tools/

  11. Stanford Stream data manager, http://www-db.stanford.edu/stream/

  12. VMware, http://www.vmware.com/

  13. zebra, http://www.zebra.org/

  14. fprobe, http://fprobe.sourceforge.net/

  15. hping, http://www.hping.org/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, CM., Jeng, B.C., Yang, C.R., Lai, G.H. (2006). Tracing Denial of Service Origin: Ant Colony Approach. In: Rothlauf, F., et al. Applications of Evolutionary Computing. EvoWorkshops 2006. Lecture Notes in Computer Science, vol 3907. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11732242_26

Download citation

  • DOI: https://doi.org/10.1007/11732242_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33237-4

  • Online ISBN: 978-3-540-33238-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics