• Title/Summary/Keyword: Traceback Technique

Search Result 18, Processing Time 0.028 seconds

Traceback Technique using Table-based Route Management under Mobile Ad Hoc Network Environment (Mobile Ad Hoc Network에서 테이블 기반 경로 관리를 이용한 역추적 기법)

  • Yang, Hwan Seok;Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.19-24
    • /
    • 2013
  • MANET has a highly dynamic topology because it consists of only mobile nodes. Various attacks using these characteristics exist. Among them, damage of the attacks based flooding such as DoS or DDos is large and traceback of the attack node is not easy. It is because route information by moving of intermediate nodes which pass the data changes frequently. In this paper, we propose table-based traceback technique to perform efficient traceback although route information by moving of nodes changes frequently. Cluster head manages route management table in order to form cluster status table and network topology snapshot for storing the location information of mobile nodes when cluster member nodes change. Also, bloom filter is used to reduce the amount of storing route information. The performance of the proposed technique is confirmed through experiment.

Design of Network-based Real-time Connection Traceback System with Connection Redirection Technology

  • Choi, Yang-Sec;Kim, Hwan-Guk;Seo, Dong-Il;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2101-2105
    • /
    • 2003
  • Recently the number of Internet users has very sharply increased, and the number of intrusions has also increased very much. Consequently, security products are being developed and adapted to prevent systems and networks from being hacked and intruded. Even if security products are adapted, however, hackers can still attack a system and get a special authorization because the security products cannot prevent a system and network from every instance of hacking and intrusion. Therefore, the researchers have focused on an active hacking prevention method, and they have tried to develop a traceback system that can find the real location of an attacker. At present, however, because of the characteristics of Internet - diversity, anonymity - the real-time traceback is very difficult. To over-come this problem the Network-based Real-Time Connection Traceback System (NRCTS) was proposed. But there is a security problem that the victim system can be hacked during the traceback. So, in this paper, we propose modified NRCTS with connection redirection technique. We call this traceback system as Connection Redirected Network-based Real-Time Connection Traceback System (CR-NRCTS).

  • PDF

Active Network for IP Traceback (IP 역추적을 위한 액티브 네트워크 기법 적용 방안)

  • 최병선;이성현;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.420-423
    • /
    • 2004
  • Advance of computer technique becomes efficient of business in recent years. It has become high-speed data transmission and large data transmission. Network and computer system need to increasingly security because advance of computer technique. So this paper analyzes IP Traceback system that prevent cyber attack as hacking and security vulnerability of network. And this paper design IP Traceback system that based on active network.

  • PDF

A Study of Path Management to Efficient Traceback Technique for MANET (MANET에서 효율적 역추적을 위한 경로관리에 관한 연구)

  • Yang, Hwan Seok;Yang, Jeong Mo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.4
    • /
    • pp.31-37
    • /
    • 2011
  • Recently, MANET(Mobile Ad-hoc Network) is developing increasingly in the wireless network. MANET has weakness because phases change frequently and MANET doesn't have middle management system. Every node which consists of MANET has to perform data forwarding, but traceback is not reliable if these nodes do malicious action owing to attack. It also is not easy to find location of attacker when it is attacked as moving of nodes. In this paper, we propose a hierarchical-based traceback method that reduce waste of memory and can manage path information efficiently. In order to manage trace path information and reduce using resource in the cluster head after network is formed to cluster, method which recomposes the path efficiently is proposed. Proposed method in this paper can reduce path trace failure rate remarkably due to moving of nodes. It can also reduce the cost for traceback and time it takes to collect information.

A Study regarding IP Traceback designs and security audit data generation. (IP 역추적 설계 및 보안감사 자료생성에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.53-64
    • /
    • 2007
  • Avoid at damage systems in order to avoid own IP address exposure, and an invader does not attack directly a system in recent hacking accidents at these papers, and use Stepping stone and carry out a roundabout attack. Use network audit Policy and use a CIS, AIAA technique and algorithm, the Sleep Watermark Tracking technique that used Thumbprints Algorithm, Timing based Algorithm, TCP Sequence number at network bases, and Presented a traceback system at TCP bases at log bases, and be at these papers Use the existing algorithm that is not one module in a system one harm for responding to invasion technology develop day by day in order to supplement the disadvantage where is physical logical complexity of configuration of present Internet network is large, and to have a fast technology development speed, and presentation will do an effective traceback system.

  • PDF

A Study on the Active Traceback Scheme Respond ing to a Security Incident (침해사고 대응을 위한 능동적 역추적 기법에 관한 연구)

  • Park Myung Chan;Park Young Shin;Choi Yong Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.1 s.33
    • /
    • pp.27-34
    • /
    • 2005
  • Current security reinforcement systems are Passive defense system that only blocks filter to all traffic from the attacker. So, Those are weak re-attack and Stepping Stones attack because active response about attacker is lacking. Also, present techniques of traceback need much time and manpower by log information collection and trace through the personal inspection and active response is lacking. In this paper, We propose technique for TCP connection traceback that can apply in present internet and trace to inserted marking on IP header to correspond re-attack and Stepping Stones attack. Therefore, Proposed technique is unnecessary correction of existing network component and can reduce size of marked information and overhead of resources.

  • PDF

IP Traceback System using iTrace Message (iTrace 메시지를 이용한 IP 역추적 시스템)

  • Cho, Han-Jin;Chae, Cheol-Joo;Lee, June-Hwan;Lee, Jae-Kwang
    • Journal of the Korea Computer Industry Society
    • /
    • v.10 no.1
    • /
    • pp.13-20
    • /
    • 2009
  • The rapid growth of the Internet has caused the hacking and virus. There are several vulnerabilities in current firewall and Intrusion Detection Systems of the Network Computing resources. Automatic real time station chase techniques can track the internet invader and reduce the probability of hacking Due to the recent trends the station chase technique has become inevitable. In this paper, we design and implement Active Security system using ICMP Traceback message. In this design no need to modify the router structure and we can deploy this technique in larger network. Our Implementation shows that ICMP Traceback system is safe to deploy and protect data in Internet from hackers and others.

  • PDF

A Study of Application Layer Traceback Through Intelligent SQL Query Analysis (지능형 SQL Query 분석을 통한 Application Layer 역추적 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.265-268
    • /
    • 2010
  • Current Traceback is difficult due to the development of bypass technique Proxy and IP-driven to trace the real IP Source IP is the IP traceback after the actual verification is difficult. In this paper, an intelligent about SQL Query field, column, table elements such as analysis of the value and the matching key values and Data used here to analyze source user hit point values for the user to trace the Application Layer IP for the analysis of forensic evidence guided by In this study, including forensic DB security will contribute to the development of electronic trading.

  • PDF

Active Security System using IP Traceback Technology (IP 역추적 기술을 이용한 능동형 보안 시스템)

  • Kim, Jae-Dong;Chae, Cheol-Joo;Lee, Jae-Kwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.5
    • /
    • pp.933-939
    • /
    • 2007
  • There is a tremendous increase in the growth of Internet making people's life easy. The rapid growth in technology has caused misuse of the Internet like cyber Crime. There are several vulnerabilities in current firewall and Intrusion Detection Systems (IDS) of the Network Computing resources. Automatic real time station chase techniques can track the internet invader and reduce the probability of hacking Due to the recent trends the station chase technique has become inevitable. In this paper, we design and implement Active Security system using ICMP Traceback message. In this design no need to modify the router structure and we can deploy this technique in larger network. Our Implementation shows that ICMP Traceback system is safe to deploy and protect data in Internet from hackers and others.

Design and Implementation of Real-time Traceback System using IP Traceback Technique (IP 역추적 기술을 이용한 실시간 역추적 시스템 설계 및 구현)

  • Chae, Cheol-Joo;Lee, Jae-Kwang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1133-1136
    • /
    • 2007
  • 방화벽(Firewall), 침입탐지시스템(IDS) 등과 같은 기존의 이러한 수동적인 보안 시스템은 최근 능동적인 시스템으로 발전되고 있다. 이에 본 논문에서는 IP 역추적 기술을 이용한 능동적 보안 시스템을 제안한다. IP 역추적을 위해 ICMP 형태의 역추적 메시지를 구현하고 지역 네트워크에 배치되는 에이전트와 관리 네트워크에 배치되는 서버 프레임워크를 설계하고, 이러한 능동형 보안 시스템을 기반으로 네트워크 기반의 침입자를 추적하고 고립화하기 위한 보안 메커니즘을 구현한다.

  • PDF