Back to Search Start Over

An IP Traceback Protocol using a Compressed Hash Table, a Sinkhole Router and Data Mining based on Network Forensics against Network Attacks

Authors :
EunHee Jeong
ByungKwan Lee
Source :
Future Generation Computer Systems. 33:42-52
Publication Year :
2014
Publisher :
Elsevier BV, 2014.

Abstract

The Source Path Isolation Engine (SPIE) is based on a bloom filter. The SPIE is designed to improve the memory efficiency by storing in a bloom filter the information on packets that are passing through routers, but the bloom filter must be initialized periodically because of its limited memory. Thus, there is a problem that the SPIE cannot trace back the attack packets that passed through the routers earlier. To address this problem, this paper proposes an IP Traceback Protocol (ITP) that uses a Compressed Hash Table, a Sinkhole Router and Data Mining based on network forensics against network attacks. The ITP embeds in routers the Compressed Hash Table Module (CHTM), which compresses the contents of a Hash Table and also stores the result in a database. This protocol can trace an attack back not only in real time using a hash table but also periodically using a Compressed Hash Table (CHT). Moreover, the ITP detects a replay attack by attaching time-stamps to the messages and verifies its integrity by hashing it. This protocol also strengthens the attack packet filtering function of routers for the System Manager to update the attack list in the routers periodically and improves the Attack Detection Rate using the association rule among the attack packets with an Apriori algorithm.

Details

ISSN :
0167739X
Volume :
33
Database :
OpenAIRE
Journal :
Future Generation Computer Systems
Accession number :
edsair.doi...........65393e562c6e4bde2050af7939a43c42
Full Text :
https://doi.org/10.1016/j.future.2013.10.023