Research on Attack Source traceback
- 10.2991/isccca.2013.22How to use a DOI?
- intrusion detection system, the source of network attack, pheromone
The existing methods of attack traceback still have many defects, such as input debugging method requires the professional intervention; ICMP traceback message takes up the network bandwidth resources and so on, so a new collaborative network is picked up, based on ant source of ideological attack tracking method. This method is mainly used strategy from ICMP traceback message, that is, data packet attacked is backed-up on the network monitor, and then the scope of the query path information is reduced using the ant colony algorithm, enabling rapid construction of the attack path. Experiments show that the method improves the query speed of tracking information and the accuracy of positioning the source attack.
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Wei Xu AU - Qiaohong Xu PY - 2013/02 DA - 2013/02 TI - Research on Attack Source traceback BT - Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation (ISCCCA 2013) PB - Atlantis Press SP - 87 EP - 90 SN - 1951-6851 UR - https://doi.org/10.2991/isccca.2013.22 DO - 10.2991/isccca.2013.22 ID - Xu2013/02 ER -