By Topic

Efficiency of using mobile agents to trace multiple sources of attack

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Armoogum, S. ; Univ. of Technol., Mauritius ; Mohamudally, N.

Recently, network resource has become extremely vulnerable to denial of service (DoS) and distributed denial of service (DDoS) attacks, which have become a pressing problem due to scarcity of an efficient method to locate the real attacker. Especially, as network topology becomes more advanced and complex, IP traceback is difficult but necessary. For protection against DoS/DDoS even partial information about the attack path is useful as it allows to throttle such attacks at distant router. Existing traceback mechanisms have serious drawbacks such as high false positive, enormous storage requirements at routers, and huge additional network traffic. As such, we make use of mobile agents for real-time traceback of multiple attack sources. The mobile agent traceback scheme presented in [2] and the proposed improvement in this paper are not only efficient as compared to other existing schemes but also has the following advantages: it is flexible, autonomous, lightweight and protocol-independent which makes it particularly suitable for the Internets' varieties of the network topology and protocols.

Published in:

Networked Digital Technologies, 2009. NDT '09. First International Conference on

Date of Conference:

28-31 July 2009