Session Based Logging (SBL) for IP-Traceback on Network Forensics
نویسندگان
چکیده
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, the source IP can be easily falsified which results in numerous problems including infamous denial of service attacks. The combination of smart devices with powerful processing capabilities once observed only in mainframe computers decades ago and the presence of the Internet which allows communications between all those devices exacerbate the problem. In this paper, we propose a novel technique called Session Based Logging (SBL) for simple and effective IP-Traceback and logging mechanism. SBL is easy to implement and also has significant advantage of saving storage space over previously proposed schemes. Moreover the SBL approach has clear edge under sensitive privacy regulations since it does not need to capture detailed contents of each individual communication session. Experimental results show its potential and ease of execution from free of any agent software installation on the logging machine. The proposed SBL scheme on this paper currently supports only TCP sessions but we believe this approach could be further extended to UDP connections which have many inherent network security problems.
منابع مشابه
Session Based Packet Marking and Auditing for Network Forensics
The widely acknowledged problem of reliably identifying the origin of network data has been the subject of many research works. Due to the nature of Internet Protocol, a source IP can be easily falsified which results in numerous problems, including the infamous denial of service attacks. In this paper, two light-weight novel approaches are proposed to solve this problem by providing simple and...
متن کاملROUTER INTERFACE BASED IP TRACEBACK METHOD FOR DDOS ATTACK IN IPV6 NETWORKS S.T.Shenbagavalli
DoS/DDoS attacks constitute one of the major classes of security threats in the Internet today. The attackers usually use IP spoofing to conceal their real location. The objective of IP traceback is to determine the real attack sources, as well as the full path taken by the attack packets. Traditional traceback schemes provide spoofed packets traceback capability either by augmenting the packet...
متن کاملAn IP Traceback Model for Network Forensics
Network forensics deals with capture, recording, analysis and investigation of network traffic to traceback the attackers. Its ultimate goal is to provide sufficient evidence to allow the perpetrator to be prosecuted. IP traceback is an important aspect in the investigation process where the real attacker is identified by tracking source address of the attack packets. In this paper we classify ...
متن کاملA Precise and Practical IP Traceback Technique Based on Packet Marking and Logging
Tracing malicious packets back to their source is important to defend the Internet against Denial of Service (DoS) intrusion. IP traceback is just the technique to realize the goal, it reconstructs IP packets traversed path in the Internet to determine their origins. There are two major kinds of IP traceback techniques, which have been proposed as packet marking and packet logging. In packet ma...
متن کاملE-RIHT: Enhanced Hybrid IP Traceback Scheme with 16-bit marking field
Internet is a worldwide network and used in almost every field of work such as industrial, educational, military etc. Based on the use, its security needs differ. Few applications may need less security and few may need high security. Today various internet attacks are being developed every day, such as viruses, DoS (Denial of Service), spoofing, etc. Spoofing is a kind of attack in which attac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006