CFP last date
20 May 2024
Reseach Article

Performance Analysis of ACO-based IP Traceback

by Jose Anand, K. Sivachandar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 59 - Number 1
Year of Publication: 2012
Authors: Jose Anand, K. Sivachandar
10.5120/9509-3895

Jose Anand, K. Sivachandar . Performance Analysis of ACO-based IP Traceback. International Journal of Computer Applications. 59, 1 ( December 2012), 1-5. DOI=10.5120/9509-3895

@article{ 10.5120/9509-3895,
author = { Jose Anand, K. Sivachandar },
title = { Performance Analysis of ACO-based IP Traceback },
journal = { International Journal of Computer Applications },
issue_date = { December 2012 },
volume = { 59 },
number = { 1 },
month = { December },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume59/number1/9509-3895/ },
doi = { 10.5120/9509-3895 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:04:54.968304+05:30
%A Jose Anand
%A K. Sivachandar
%T Performance Analysis of ACO-based IP Traceback
%J International Journal of Computer Applications
%@ 0975-8887
%V 59
%N 1
%P 1-5
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Internet has experienced a tremendous expansion in its size and complexity since its commercialization. Internet hosts are threatened by large-scale Distributed Denial-of-Service (DDoS) attacks in the network. DDoS attacks typically rely on compromising a large number of hosts to generate traffic to a single destination node. Thus the severity of DDoS attacks will likely increase to the possible extend, as greater numbers of poorly secured hosts are connected to high-bandwidth Internet connections. To detect and coordinate DDoS attacks in the network usually an Intrusion Detection System (IDS) is used but, this method consumes most of the resources and thereby degrades the network performance. Moreover, the memory-less feature of the routing mechanism makes the operation hard to traceback the source of the DDoS attacks. This paper analyzed the performance of an Ant Colony Optimization (ACO)-based IP traceback method to identify the origin of the attack in the network. The ACO-based IP traceback approach uses flow level information to identify the origin of a DDoS attack. The ACO-based IP traceback method is implemented using NS-2 simulation on various network scenarios consisting of 8 nodes, 10 nodes, and 14 nodes. The results of the experimental and simulation studies demonstrate the effectiveness and efficiency of the proposed system.

References
  1. S. Bellovin, "ICMP traceback messages", Internet draft: Draft-bellovin-itracc-00. txt, March 2000.
  2. H. Burch, and B. Cheswick, "Tracing anonymous packets to their approximate source", Proceedings of the 14th USENIX Systems Administration Conference, New Orleans, USA, December 2000.
  3. Chao Gong, Trinh Le, Turgay Korkmaz, and Kamil Sarac, "Single Packet IP Traceback in AS-level Partial Deployment Scenario", Proceedings of the IEEE Globecom, St. Louis, MO, USA, pp. 1817-1821, Nov. 28th – Dec. 2nd, 2005.
  4. Chu Hsing Lin, Jung Chun Liu, Hsun Chi Huang and Tsung Che Yang, "Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks", Proceedings of the International Conference on Multimedia and Ubiquitous Engineering, IEEE Computer Society, pp. 176-181, 24-26 April 2008.
  5. Dalia Nashat, Xiaohong Jiang and Susumu Horiguchi, "Detecting SYN Flooding Agents under any type of IP Spoofing", Proceedings of the IEEE International Conference on e-Business Engineering, IEEE Computer Society, pp. 499-505, 22-24 October 2008.
  6. D. Dean, M. Franklin, and A. Stubblefield, "An Algebraic Approach to IP Traceback," ACM Transactions on Information and System Security (TISSEC), Vol. 5, No. 2, pp. 119-137, May 2002.
  7. S. Dietrich, N. Long, and D. Dittrich, "Analyzing distributed denial of service tools: The shaft ease," Proceedings of USENIX LISA 2000, New Orleans, LA, USA, pp. 329-339, 3-8 Dec. 2000.
  8. M. T. Goodrich, "Probabilistic Packet Marking for Large-Scale IP Traceback", IEEE/ACM Transactions on Networking, Vol. 16, No. 1, pp. 15-24, Feb. 2008.
  9. Gu Hsin Lai, Chia-Mei Chen, Bing-Chiang Jeng, and Willams Chao, "Ant-based IP traceback", International Journal on Expert Systems and Applications, Elsevier, Vol. 34, Issue 4, pp. 3071-3080, May 2008.
  10. Hikmat Farhat, "A Scalable Method to Protect From IP Spoofing", Proceedings of the IEEE International Conference on The Applications of Digital Information and Web Technologies, IEEE press, ISBN: 978-1-4244-2623-2, pp. 569-572, 2008.
  11. Marco Dorigo and Christian Blum, "Ant colony optimization theory: A survey", Journal of Theoretical Computer Science, Elsevier, Vol. 344, Issues 2-3, pp. 243-278, 17th Nov. 2005.
  12. Marco Dorigo and Luca Maria Gambardella, "Ant Colonies for the traveling Salesman problem", University Libre de Bruxelles, Publication in Bio Systems, (TR/IRIDIA/1996-3), Belgium, 1997.
  13. G. Ramesh, S. Sundara Vadivelu and Jose Anand, "Design of Optimized WDM Networks Using Heuristic Algorithms" International Journal of Advance in Communication Engineering, Vol. 01, No. 2, pp. 93-98, ISSN 0975-6094, July-Dec. 2009.
  14. Ruiliang Chen and Jung-Min Park, "Attack Diagnosis: Throttling Distributed Denial-of-Service Attacks Close to the Attack Sources", Proceedings of 14th International (IEEE) Conference on Computer Communications and Networks (ICCCN 2005), Issue 4, pp. 275-280, Oct. 2005.
  15. Shengrong Bu, Richard Yu F. , Xiaoping P. Liu, Peter Mason, and Helen Tang, "Distributed Combined Authentication and Intrusion Detection with Data Fusion in High-Security Mobile Ad hoc Networks", IEEE Transactions on Vehicular Technology, Vol. 60, No. 3, pp. 1025-1036, March 2011.
  16. Shui Yu, Wanlei Zhou, Robin Doss, and Weijia Jia, "Traceback of DDoS Attacks using Entropy Variations", IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No. 3, pp. 412-425, March 2011.
  17. D. Srinath, J. Janet, and Jose Anand, "A Survey of Routing Instability with IP Spoofing on the Internet", Asian Journal of Information Technology, Vol. 9, No. 3, pp. 154-158, 2010.
  18. Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson, "Network Support for IP Traceback", IEEE/ACM Transactions on Networking, Vol. 9, No. 3, pp. 226-237, June 2001.
  19. Vamsi Paruchuri, Arjan Durresi, and Leonard Barolli, "FAST: Fast Autonomous System Traceback", Proceedings of 21st International Conference on Advanced Networking and Applications (AINA'07), IEEE Computer Society, Niagara Falls, Canada, pp. 498-505, 21-23 May 2007.
  20. Voravud Santiraveewan and Yongyuth Permpoontanalarp, "A Graph-based Methodology for Analyzing IP Spoofing Attack", Proceedings of the 18th International Conference on Advanced Information Networking and Application (AINA'04), IEEE Computer Society, Vol. 2, 29-31 March 2004.
  21. Wei Chen, and Dit-Yan Yeung, "Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing", Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06), IEEE Computer Society, Morne, Mauritius, page 38, 23-29 April 2006.
  22. Wei Ren and Hai Jin, "A Recursion Nearness based method for Characterizing IP Address", Proceedings of the Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'05), IEEE Computer Society, Dalian, China, pp. 665-669, 5-8 Dec. 2005.
  23. Y. Xiang, W. Zhou, and M. Guo, "Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks", IEEE Transactions on Parallel and Distributed Systems, Vol. 20, No. 4, pp. 567-580, April 2009.
  24. Yan Shen, Jun Bi, Jianping Wu and Qiang Liu, "A Two-Level Source Address Spoofing Prevention based on Automatic Signature and Verification Mechanism", Proceedings of 13th IEEE Symposium on Computers and Communications (ISCC 2008), Marrakech, Morocco, pp. 392-397, 6-9 July 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Ant Colony Optimization attacks DDoS Internet IP traceback pheromone