Skip to main content

Tracking Illegal System Access in a Ubiquitous Environment – Proposal for ATS, a Traceback System Using STOP

  • Conference paper
Computational Science and Its Applications - ICCSA 2006 (ICCSA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3983))

Included in the following conference series:

  • 789 Accesses

Abstract

In a ubiquitous environment, the boundaries of network topology can change irregularly. In this paper, an Agent-based Traceback System (ATS) is proposed to track attacks that utilize systems within an area of the network topology that has been marked for management purposes. Some of the information exchanged within the proposed system utilizes the previously verified STOP [1]. The additional information provided by utilizing the ATS proposed in this paper will greatly enhance the reliability of the traceback process. In addition, the proposed system is flexible enough to be applied to resource management systems as well.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Carrier, B., Shields, C.: The Session Token Protocol for Forensics and Traceback. ACM Transactions on Information and System Security 7(3) (2004)

    Google Scholar 

  2. Park, K., Lee, H.: On the effectiveness of probabilistic packet marking for IP under denial of service attack. In: Proc. IEEE INFOCOM 2001, pp. 338–347 (2001)

    Google Scholar 

  3. Song, D.X., Perrig, A.: Advanced and Authenticated Marking Scheme for IP Traceback. In: Proc. Infocom, vol. 2, pp. 878–886 (2001)

    Google Scholar 

  4. Bellovin, S., Taylor, T.: ICMP Traceback Messages. RFC 2026, Internet Task Force (2003)

    Google Scholar 

  5. Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical Network Support for IP Traceback. Technical Report UW-CSE-2000-02-01, Department of Computer Science and Engineering, University of Washington

    Google Scholar 

  6. Stone, R.: CenterTrack: an IP overlay network for tracking DoS floods. In: Proc. 9th Usenix Security Symp. (2000)

    Google Scholar 

  7. Snoeren, A.C., Partridge, C., Sanchez, L.A., Strayer, W.T., Jones, C.E., Tchakountio, F., Kent, S.T.: Hash-Based IP Traceback. BBN Technical Memorandum No. 1284 (2001)

    Google Scholar 

  8. Chang, H.Y., et al.: Deciduous: Decentralized Source Identification for Network-based Intrusions. In: Proc. 6th IFIP/IEEE Int’l Symp., Integrated Net., Mmgt. (1999)

    Google Scholar 

  9. Jung, H.T., Kim, H.L., Seo, Y.M., Choe, G., Min, S.L., Kim, C.S., Koh, K.: Caller Identification system in the Internet environment. In: UNIX Security Symposium IV PRoceedings (1993)

    Google Scholar 

  10. Johns, M.S.: Authentication server. RFC 931, TPSC

    Google Scholar 

  11. Johns, M.S.: Identification Protocol, RFC 1413, US Department of Defense

    Google Scholar 

  12. Baba, T., Matsuda, S.: Tracing Network Attacks to Their Sources. IEEE Internet Computing (2002)

    Google Scholar 

  13. Belenky, A., Ansari, N.: On IP Traceback. IEEE Communication Magazine (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, G., Hwang, S., Lee, D. (2006). Tracking Illegal System Access in a Ubiquitous Environment – Proposal for ATS, a Traceback System Using STOP. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751632_37

Download citation

  • DOI: https://doi.org/10.1007/11751632_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34077-5

  • Online ISBN: 978-3-540-34078-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics