Development of an Internet Protocol Traceback Scheme for Denial of Service Attack Source Detection

To mitigate the challenges that Flash Event (FE) poses to IP-Traceback techniques, this paper presents an IP Traceback scheme for detecting the source of a DoS attack based on Shark Smell Optimization Algorithm (SSOA). The developed model uses discrimination policy with hop-by-hop search. Random ne...

Full description

Bibliographic Details
Main Authors: O. W. Salami, I. J. Umoh, E. A. Adedokun
Format: Article
Language:English
Published: Faculty of Engineering and Technology 2019-09-01
Series:Nigerian Journal of Technological Development
Subjects:
Online Access:https://journal.njtd.com.ng/index.php/njtd/article/view/295
Description
Summary:To mitigate the challenges that Flash Event (FE) poses to IP-Traceback techniques, this paper presents an IP Traceback scheme for detecting the source of a DoS attack based on Shark Smell Optimization Algorithm (SSOA). The developed model uses discrimination policy with hop-by-hop search. Random network topologies were generated using the WaxMan model in NS2 for different simulations of DoS attacks. Discrimination policies used by SSOA-DoSTBK for the attack source detection in each case were set up based on the properties of the detected attack packets. SSOA-DoSTBK was compared with a number of IP Traceback schemes for DoS attack source detection in terms of their ability to discriminate FE traffic from attack traffic and the detection of the source of spoofed IP attack packets. SSOA-DoSTBK IP traceback scheme outperformed ACS-IPTBK that it was benchmarked by 31.8%, 32.06%, and 28.45% lower FER for DoS only, DoS with FE, and spoofed DoS with FE tests, respectively and 4.76%, 11.6%, and 5.2% higher performance in attack path detection for DoS only, DoS with FE, and spoofed DoS with FE tests, respectively. However, ACS-IPTBK was faster than SSOA-DoSTBK by 0.4%, 0.78%, and 1.2% for DoS only, DoS with FE, and spoofed DoS with FE tests, respectively.
ISSN:2437-2110