Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Ant Colony Traceback for Low Rate DOS Attack

Print
PDF
IJCA Special Issue on Computational Intelligence & Information Security
© 2012 by IJCA Journal
CIIS - Number 1
Year of Publication: 2012
Authors:
M. Hamedi-hamzehkolaie
M. J. Shamani
M. B. Ghaznavi-ghoushchi
10.5120/9414-1005

M Hamedi-hamzehkolaie, M J Shamani and M B Ghaznavi-ghoushchi. Article: Ant Colony Traceback for Low Rate DOS Attack. IJCA Special Issue on Computational Intelligence & Information Security CIIS(1):22-26, November 2012. Full text available. BibTeX

@article{key:article,
	author = {M. Hamedi-hamzehkolaie and M. J. Shamani and M. B. Ghaznavi-ghoushchi},
	title = {Article: Ant Colony Traceback for Low Rate DOS Attack},
	journal = {IJCA Special Issue on Computational Intelligence & Information Security},
	year = {2012},
	volume = {CIIS},
	number = {1},
	pages = {22-26},
	month = {November},
	note = {Full text available}
}

Abstract

Denial of service is one of the most common threats on the public open networks like Internet which taken up by spoofing in the IP address source and leads to exploit the system resources. This results in a decline in the system performance and normal response. In this paper, the traceback to intruder approach by ant colony algorithm will be applied. And the variance of flow will be used to traceback the Denial Of Service or DOS attack source based on ant colony and metaheuristic algorithms. The simulation results show that the proposed approach can trace the attacks even if the attack traffic intensity is relatively low and by initializing the algorithm parameters correctly. Our simulations show that the probability of errors will reach to its lowest rate or even to zero and this is considered as an effective step in tracing attacks by means of metaheuristic algorithms.

References

  • Anstee, D. 2010. DDoS Attack Trends through 2010. Infrastructure Security Report & ATLAS Initiative.
  • Shinoda, Y. 2012. Global Information Security Threats Trend. In Proceedings of the Cryptrec Symposium.
  • K. Lu, D. Wu, J. Fan, S. Todorovic, A. Nucci, "Robust and efficient detection of DDoS attacks for large-scale internet", Computer Networks, vol. 51, no. 9, pp. 5036-5056, 2007.
  • Park, K. , Lee, H. 2001. On the efectiveness of route-based packet ?ltering for distributed dos attack prevention in power-law internets. In Proceedings of ACM SIGCOMM.
  • Ferguson, P. , Senie, D. 1998. Network ingress ?ltering: Defeating denial of service attacks which employ ip source address spoo?ng. RFC 2267.
  • S. Chen, Q. Song, "Perimeter-based defense against high bandwidth DDoS attacks", IEEE Transaction. Parallel Distribut System. 16 (6) 526–537, 2005.
  • A. Shahzad, R. Naseem, F. Aadil, Sh. Khayyam, "Trends in defensive techniques against Denial of Service (DoS) Attacks", Canadian Journal on Network and Information Security Vol. 1, No. 1, April 2010.
  • H. Aljifri, M. Smets, A. Pons, "IP traceback using header Compression", journal of Computers & Security, 22(2), 136–151, 2003.
  • A. C. Soneren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tachakountio, B. Schwartz, et al, "Single-packet IP traceback", IEEE/ACM Transactions on Networking, 10(6), 721–734, 2002.
  • T. Baba, S. Matsuda, "Tracing network attacks to their sources", IEEE Internet Computing, 6(3), 20–26. 2002.
  • M. Chen, B. C. Jeng, W. Chao, "Ant-based IP traceback", Expert System Systems with Application journal, vol. 34, pp. 3071-3080, 2008.
  • Hamedi-Hamzehkolaie, M. , Shamani, M. J. , Ghaznavi-Ghoushchi, M. B. 2011. DoS-Traceback with Ant Colony Algorithm. In Proceedings of the Iran Electronic War Conference, In Persian.
  • Dorigo, M. , Maniezzo, V. , Colorni, A. 1991. Positive feedback as a search strategy. Milan, Italy: Politecnico di Milano, Dipartimento di Elettronica, Tech. Rep. 91-016.
  • M. Goodrich, "Probabilistic packet marking for large-scale IP traceback," IEEE/ACM Transactions on Networking, vol. 16, pp. 15-24, 2008.
  • S. Sreenivasulu, S. S. Raja Kumari and V. Chandra Sekhar, "Defense of DDoS Attacks using Traffic Analysis at Router Level", International Journal of Computer Applications, Volume 51– No. 10, August 2012.
  • Chen, H. , Yang, W. 2010. The Design and Implementation of a Practical Meta-Heuristic for the Detection and Identification of Denial-of-Service Attack Using Hybrid Approach. In Proceedings of the Second International Conference on Machine Learning and Computing.
  • Hamedi-Hamzehkolaie, M. , Shamani, M. J. , Ghaznavi-Ghoushchi, M. B. 2012. Low Rate DOS Traceback Based On Sum of Flows. In Proceedings of the Sixth International Symposium on Telecommunication, IST 2012.