A proposal for cyber-attack trace-back using packet marking and logging

Pengfei Li, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Cyber-attack incidents have become more and more frequent and serious. As a countermeasure against cyber-attacks, the technology of (IP address etc.) trace-back to the attackers is essential. Although many methods have been proposed for this purpose, the existing techniques suffer from the following problems. Only the specific attacks can be traced back. The tracing back is too time-consuming and correct traffic-path reconfiguration cannot be guaranteed. In this study, we propose a new method to discover attackers quickly and correctly. By using simulation data, its performance is demonstrated.

Original languageEnglish
Title of host publicationProceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016
EditorsFatos Xhafa, Leonard Barolli, Noriki Uchida
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages603-607
Number of pages5
ISBN (Electronic)9781509009848
DOIs
Publication statusPublished - Dec 21 2016
Event10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016 - Fukuoka, Japan
Duration: Jul 6 2016Jul 8 2016

Publication series

NameProceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016

Other

Other10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016
CountryJapan
CityFukuoka
Period7/6/167/8/16

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications

Cite this