Abstract
In a ubiquitous environment, the boundaries of network topology can change irregularly. In this paper, an Agent-based Traceback System (ATS) is proposed to track attacks that utilize systems within an area of the network topology that has been marked for management purposes. Some of the information exchanged within the proposed system utilizes the previously verified STOP [1]. The additional information provided by utilizing the ATS proposed in this paper will greatly enhance the reliability of the traceback process. In addition, the proposed system is flexible enough to be applied to resource management systems as well.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Carrier, B., Shields, C.: The Session Token Protocol for Forensics and Traceback. ACM Transactions on Information and System Security 7(3) (2004)
Park, K., Lee, H.: On the effectiveness of probabilistic packet marking for IP under denial of service attack. In: Proc. IEEE INFOCOM 2001, pp. 338–347 (2001)
Song, D.X., Perrig, A.: Advanced and Authenticated Marking Scheme for IP Traceback. In: Proc. Infocom, vol. 2, pp. 878–886 (2001)
Bellovin, S., Taylor, T.: ICMP Traceback Messages. RFC 2026, Internet Task Force (2003)
Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical Network Support for IP Traceback. Technical Report UW-CSE-2000-02-01, Department of Computer Science and Engineering, University of Washington
Stone, R.: CenterTrack: an IP overlay network for tracking DoS floods. In: Proc. 9th Usenix Security Symp. (2000)
Snoeren, A.C., Partridge, C., Sanchez, L.A., Strayer, W.T., Jones, C.E., Tchakountio, F., Kent, S.T.: Hash-Based IP Traceback. BBN Technical Memorandum No. 1284 (2001)
Chang, H.Y., et al.: Deciduous: Decentralized Source Identification for Network-based Intrusions. In: Proc. 6th IFIP/IEEE Int’l Symp., Integrated Net., Mmgt. (1999)
Jung, H.T., Kim, H.L., Seo, Y.M., Choe, G., Min, S.L., Kim, C.S., Koh, K.: Caller Identification system in the Internet environment. In: UNIX Security Symposium IV PRoceedings (1993)
Johns, M.S.: Authentication server. RFC 931, TPSC
Johns, M.S.: Identification Protocol, RFC 1413, US Department of Defense
Baba, T., Matsuda, S.: Tracing Network Attacks to Their Sources. IEEE Internet Computing (2002)
Belenky, A., Ansari, N.: On IP Traceback. IEEE Communication Magazine (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, G., Hwang, S., Lee, D. (2006). Tracking Illegal System Access in a Ubiquitous Environment – Proposal for ATS, a Traceback System Using STOP. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751632_37
Download citation
DOI: https://doi.org/10.1007/11751632_37
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34077-5
Online ISBN: 978-3-540-34078-2
eBook Packages: Computer ScienceComputer Science (R0)