CFP last date
20 March 2024
Reseach Article

Ant Colony Traceback for Low Rate DOS Attack

Published on November 2012 by M. Hamedi-hamzehkolaie, M. J. Shamani, M. B. Ghaznavi-ghoushchi
Computational Intelligence & Information Security
Foundation of Computer Science USA
CIIS - Number 1
November 2012
Authors: M. Hamedi-hamzehkolaie, M. J. Shamani, M. B. Ghaznavi-ghoushchi
3041afdd-8af9-4241-8710-8c8c840b7fed

M. Hamedi-hamzehkolaie, M. J. Shamani, M. B. Ghaznavi-ghoushchi . Ant Colony Traceback for Low Rate DOS Attack. Computational Intelligence & Information Security. CIIS, 1 (November 2012), 22-26.

@article{
author = { M. Hamedi-hamzehkolaie, M. J. Shamani, M. B. Ghaznavi-ghoushchi },
title = { Ant Colony Traceback for Low Rate DOS Attack },
journal = { Computational Intelligence & Information Security },
issue_date = { November 2012 },
volume = { CIIS },
number = { 1 },
month = { November },
year = { 2012 },
issn = 0975-8887,
pages = { 22-26 },
numpages = 5,
url = { /specialissues/ciis/number1/9414-1005/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Computational Intelligence & Information Security
%A M. Hamedi-hamzehkolaie
%A M. J. Shamani
%A M. B. Ghaznavi-ghoushchi
%T Ant Colony Traceback for Low Rate DOS Attack
%J Computational Intelligence & Information Security
%@ 0975-8887
%V CIIS
%N 1
%P 22-26
%D 2012
%I International Journal of Computer Applications
Abstract

Denial of service is one of the most common threats on the public open networks like Internet which taken up by spoofing in the IP address source and leads to exploit the system resources. This results in a decline in the system performance and normal response. In this paper, the traceback to intruder approach by ant colony algorithm will be applied. And the variance of flow will be used to traceback the Denial Of Service or DOS attack source based on ant colony and metaheuristic algorithms. The simulation results show that the proposed approach can trace the attacks even if the attack traffic intensity is relatively low and by initializing the algorithm parameters correctly. Our simulations show that the probability of errors will reach to its lowest rate or even to zero and this is considered as an effective step in tracing attacks by means of metaheuristic algorithms.

References
  1. Anstee, D. 2010. DDoS Attack Trends through 2010. Infrastructure Security Report & ATLAS Initiative.
  2. Shinoda, Y. 2012. Global Information Security Threats Trend. In Proceedings of the Cryptrec Symposium.
  3. K. Lu, D. Wu, J. Fan, S. Todorovic, A. Nucci, "Robust and efficient detection of DDoS attacks for large-scale internet", Computer Networks, vol. 51, no. 9, pp. 5036-5056, 2007.
  4. Park, K. , Lee, H. 2001. On the efectiveness of route-based packet ?ltering for distributed dos attack prevention in power-law internets. In Proceedings of ACM SIGCOMM.
  5. Ferguson, P. , Senie, D. 1998. Network ingress ?ltering: Defeating denial of service attacks which employ ip source address spoo?ng. RFC 2267.
  6. S. Chen, Q. Song, "Perimeter-based defense against high bandwidth DDoS attacks", IEEE Transaction. Parallel Distribut System. 16 (6) 526–537, 2005.
  7. A. Shahzad, R. Naseem, F. Aadil, Sh. Khayyam, "Trends in defensive techniques against Denial of Service (DoS) Attacks", Canadian Journal on Network and Information Security Vol. 1, No. 1, April 2010.
  8. H. Aljifri, M. Smets, A. Pons, "IP traceback using header Compression", journal of Computers & Security, 22(2), 136–151, 2003.
  9. A. C. Soneren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tachakountio, B. Schwartz, et al, "Single-packet IP traceback", IEEE/ACM Transactions on Networking, 10(6), 721–734, 2002.
  10. T. Baba, S. Matsuda, "Tracing network attacks to their sources", IEEE Internet Computing, 6(3), 20–26. 2002.
  11. M. Chen, B. C. Jeng, W. Chao, "Ant-based IP traceback", Expert System Systems with Application journal, vol. 34, pp. 3071-3080, 2008.
  12. Hamedi-Hamzehkolaie, M. , Shamani, M. J. , Ghaznavi-Ghoushchi, M. B. 2011. DoS-Traceback with Ant Colony Algorithm. In Proceedings of the Iran Electronic War Conference, In Persian.
  13. Dorigo, M. , Maniezzo, V. , Colorni, A. 1991. Positive feedback as a search strategy. Milan, Italy: Politecnico di Milano, Dipartimento di Elettronica, Tech. Rep. 91-016.
  14. M. Goodrich, "Probabilistic packet marking for large-scale IP traceback," IEEE/ACM Transactions on Networking, vol. 16, pp. 15-24, 2008.
  15. S. Sreenivasulu, S. S. Raja Kumari and V. Chandra Sekhar, "Defense of DDoS Attacks using Traffic Analysis at Router Level", International Journal of Computer Applications, Volume 51– No. 10, August 2012.
  16. Chen, H. , Yang, W. 2010. The Design and Implementation of a Practical Meta-Heuristic for the Detection and Identification of Denial-of-Service Attack Using Hybrid Approach. In Proceedings of the Second International Conference on Machine Learning and Computing.
  17. Hamedi-Hamzehkolaie, M. , Shamani, M. J. , Ghaznavi-Ghoushchi, M. B. 2012. Low Rate DOS Traceback Based On Sum of Flows. In Proceedings of the Sixth International Symposium on Telecommunication, IST 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Denial Of Service Ant Colony Traceback Metaheuristic Algorithms Network Traffic