Tracing denial of service origin: ant colony approach

  • Authors:
  • Chia-Mei Chen;Bing Chiang Jeng;Chia Ru Yang;Gu Hsin Lai

  • Affiliations:
  • Department of Information Management, National Sun Yat-Sen University, Kaohsiung, Taiwan;Department of Information Management, National Sun Yat-Sen University, Kaohsiung, Taiwan;Department of Information Management, National Sun Yat-Sen University, Kaohsiung, Taiwan;Department of Information Management, National Sun Yat-Sen University, Kaohsiung, Taiwan

  • Venue:
  • EuroGP'06 Proceedings of the 2006 international conference on Applications of Evolutionary Computing
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Denial-of-Service (DoS) attacks with fake source IP addresses have become a major threat to the Internet. Intrusion detection systems are often used to detect DoS attacks. However, DoS attack packets attempt to exhaust resources, degrading network performance or, even worse, causing network breakdown. The proposed proactive approach is allocating the original attack host(s) issuing the attacks and stopping the malicious traffic, instead of wasting resources on the attack traffic. Ant colony based traceback approach is presented in this study to identify the DoS attack original source IP address. Instead of creating a new function or processing a high volume of fine-grained data, the proposed IP address traceback approach uses flow level information to identify the origin of a DoS attack. The proposed method is evaluated through simulation on various network environments. The simulation results show that the proposed method can successfully and efficiently find the DoS attack path in various simulated network environments.