Ant System Algorithm Based Ip Traceback Method to Detect Denial of Service Attack on Data Network

Resource sharing is the prime criteria of internet where anybody sends any information to anyone without a prerequisite. Currently many numbers of online applications are performed through internet. As per the design architecture Internet has no centralized governance in either technological implementation or policies for access and its usage. Hence internet do not performs any security verification of the originality of each data packets. The lack of such verification opens the door for a variety of network security vulnerabilities like denial-of-service (DoS) attacks, man-in-the-middle attacks etc. One of the major threats to the Internet is DoS attack which is achieved by source IP address spoofing. To detect the origin of the attack a number of detection techniques are proposed by the research community. One of the proactive approaches is the traceback technique used to identify the origin of the attack. Among different traceback technique this article proposed an ant system based traceback technique where pheromone intensity is the metric considered for the detection of the DoS attack origin. The simulation results confirmed that the proposed method can successfully find out the DoS attack origin.

[1]  Dawn Xiaodong Song,et al.  StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense , 2006, IEEE Journal on Selected Areas in Communications.

[2]  Nirwan Ansari,et al.  IP traceback with deterministic packet marking , 2003, IEEE Communications Letters.

[3]  Thomas Stützle,et al.  Ant Colony Optimization: Overview and Recent Advances , 2018, Handbook of Metaheuristics.

[4]  Feng Deng-guo,et al.  Notes on Packet Marking for IP Traceback , 2004 .

[5]  José Neuman de Souza,et al.  An innovative approach to identify the IP address in denial‐of‐service (DoS) attacks based on Cauchy's integral theorem , 2009, Int. J. Netw. Manag..

[6]  Anna R. Karlin,et al.  Network support for IP traceback , 2001, TNET.

[7]  Salah Zidi,et al.  Ant Colony with Dynamic Local Search for the Time Scheduling of Transport Networks , 2006, Int. J. Comput. Commun. Control.

[8]  Marco Dorigo,et al.  Ant system: optimization by a colony of cooperating agents , 1996, IEEE Trans. Syst. Man Cybern. Part B.

[9]  Minyi Guo,et al.  Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[10]  Li De,et al.  Notes on Packet Marking for IP Traceback , 2004 .

[11]  Jung-Min Park,et al.  A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks , 2007, IEEE Transactions on Parallel and Distributed Systems.

[12]  Nirwan Ansari,et al.  On deterministic packet marking , 2007, Comput. Networks.

[13]  Chia-Mei Chen,et al.  Ant-based IP traceback , 2008, Expert Syst. Appl..

[14]  Peter K. Yu,et al.  National Sun Yat-sen University (Taiwan) , 1985 .

[15]  Alex C. Snoeren,et al.  Hash-based IP traceback , 2001, SIGCOMM '01.

[16]  Lih-Chyau Wuu,et al.  IP Traceback Based on Chinese Remainder Theorem , 2007, J. Inf. Sci. Eng..