RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks
Abstract
:1. Introduction
1.1. Motivation
1.2. Research Methodology
- Different types of DDoS attacks are investigated and explored. The investigation is narrowed down to focus on SYN-Flood DDoS attacks;
- A comprehensive literature review has been conducted to find the strength and limitations of previous works;
- A careful design for the IP traceback algorithm has been proposed considering scenarios for DoS and DDoS attacks. The design periodically collects statistical information about traffic forwarded at the edge routers where the algorithm decides upon initiating the IP traceback or not. Two unique features identify the scheme. The first is the reliability of path reconstruction using hop-by-hop TCP connections. The second feature is the use of one trace packet per attack path, which makes it lightweight by avoiding the injection of extra traffic overhead in the network;
- Theoretical analysis was performed to find the complexity of the proposed algorithm and analyzing the convergence time of it;
- Extensive simulation runs were conducted to validate the correctness of the algorithm. Each data point represents the average of 15 simulation runs;
- The proposed algorithm is compared with a relevant one using different performance metrics.
2. Related Work
2.1. Detection and Classification Approaches
- Statistical Approaches: Statistical models are built on benign and malicious DDoS traffic, which are then applied to detect and classify DDoS attacks. In [9], DDoS Shield classifies DDoS attacks based on the exploited application workload parameters. The threshold values are preset on the workload parameters based on the measurements and labels the behaviors exceeding the thresholds as malicious. Ref. [10] proposed a scheme that detects floods of HTTP GET by modeling the webpages’ browsing order and finding the correlation between browsing time and the pages’ information size. In general, statistical approaches are efficient and controllable providing good accuracy in discovering simple DDoS attacks such as HTTP flood and slow DDoS attacks; however, they might not be efficient in handling complicated attacks.
- Learning Approaches: With the machine learning algorithms’ advancement and ability to provide intelligent solutions, many researchers are harnessing these techniques on big data for detecting DDoS attacks. In [11], the authors proposed a three-layer feed-forward neural network that detects DDoS attacks using extracted features from the packets’ header fields. Ref. [12] applied Stacked AutoEncoder, which is a deep learning scheme that aims to receive high-level features and generates features from web server logs building a logistic regression classifier to determine DDoS attacks. ARTP [13] detects DDoS attacks by leveraging the K-means algorithm and conducting analysis on features such as request’s interval, chain context, and length. To summarize, leveraging machine learning techniques to identify DDoS have mixed results depending on the feature extraction approach, the scheme’s design, and the learning algorithm.
- Markovian Approaches: A Markov model is defined as a stochastic model that models randomly changing events in probability theory [14]. It works by assuming that the future state depends on the current state only, and the next state can be inferred by conducting probability analysis on its past. The works in [15,16,17,18] track the correlated behavior of users and utilizes hidden semi-Markov model with a random-walk graph for tracing the DDoS attacks. Markov-based approaches are the state of the art because DDoS attacks are stateful. To address stateful issues, Markov-based approaches can provide fine-grained and highly accurate detection and classification results.
- Probabilistic Packet Marking Approaches: In [19,20], the scheme suggests that routers randomly mark IP packets using an edge identifier, which is the start and end points of a single hop in the packet path. If enough packets are sent, the victim can construct the attack path through the parameterized packets. In this scheme, it is suggested that the information to be encoded in the identification field of the IP header. However, the modification of the identification field in the IP header could lead to the failure in assembling the fragments completely. In [21], Traffic-Aware Probabilistic Packet Marking (TAPPM) was proposed, which is a collaborative DDoS mitigation framework based on traffic-aware probabilistic packet marking. It enables the victim to select some of the hit routers as collaborators to mitigate attack traffic depending on the traffic distribution. In [22], the authors proposed a solution to the Interest Flooding Attack (IFA) in Named Data Networking. The solution leverages hypothesis testing theory to develop a Generalized Likelihood Ratio Test adapted to evolved IFA attacks. The work presented in [23] suggests an overview of the main cloud vulnerabilities, along with solutions proposed for the H2020 CLARUS project. It provides monitoring techniques for intrusion detection and prevention, including attack tolerance mechanisms. In [24], a trusted multidomain DDoS detection method based on federated learning was proposed. It works by dividing the types of DDoS attacks into sub-attacks where, in each domain, a design of the federated learning dataset for DDoS detection is made and used to realize a comprehensive detection method. Packet marking schemes were proposed in works such as the spatial marking technique [25], deterministic packet marking [26], and marking-on-demand scheme [27]. These schemes insert marks into a predefined space of the IP header of the packets. However, the uncertainty of IP marking leads to information loss at a certain tracing failure probability. Moreover, these marking methods cause an increase in overhead when an attack occurs. In [28], the authors used blockchain to support data accountability and tracking sources. The study focuses on the production line of IoT devices but does not use the characteristics of blockchain to track DDoS attacks.
2.2. Mitigation Approaches
3. The Proposed Robust Attack Path Tracing Algorithm
3.1. Attack Type
3.2. Assumptions and Features
- It must track down and stop the SYN-Flood attack;
- It must be robust against distributed attacks;
- The detection time must be near-optimal;
- It should not dramatically affect the victim and/or network performance; and
- Administrative cost should be minimal.
3.3. RAPT Algorithm Design
- Destination IP address of the packet;
- Frequency () and () of received SYN packets during the periods t and , respectively, noting that will become for the next period;
- Relative change in Frequency () of SYN packets;
- Cumulative mean of Frequency () in SYN packets.
Destination IP Address | ||||
---|---|---|---|---|
142.250.185.132 | 7 | 20 | 1.86 | 84 |
20.50.169.216 | 126 | 432 | 2.43 | 170 |
87.236.232.169 | 531 | 274 | −0.48 | 243 |
195.26.133.182 | 376 | 248 | −0.34 | 289 |
3.3.1. At the Edge Router
- At the end of the current t period, the edge router compares and (see Equations (1) and (2) below) against two thresholds and , respectively. If both are exceeding these two thresholds, this might indicate that the SYN traffic is malicious and a potential attack might be active. Therefore, the router must create a trace packet called TracePack, which will pass through all the routers between the victim and the attacker/daemon including edge and core routers. The enroute routers record their IP addresses on the payload of TracePack, which is used by the victim to extract the entire attack path:
- Pick one of the SYN packets randomly named RandPack from the incoming SYN traffic destined to the potential victim;
- (a)
- If the packet is a fragment, its identifier will be the value stored in the identification field of the IP header;
- (b)
- Otherwise, the unused identification field (set to 0) will be used such that the router generates a pseudo random number as a function of time to be used as an identifier for the packet and write it to the identification field;
- generates a trace packet called TracePack with the following information:
- (a)
- Source address being s IP address;
- (b)
- Destination address is RandPack’s destination address (victim’s IP address);
- (c)
- Append to the payload of TracePack the source address of RandPack, identifier of RandPack, and s IP address. The reason behind appending RandPack’s ID field is because the next-hop router needs to recognize RandPack from other flowing packets. This is ensured by forwarding TracePack ahead of RandPack, which allows to capture RandPack;
- sends TracePack to the next-hop using hop-by-hop TCP connections [38] to guarantee the delivery of TracePack;
- Upon receiving the acknowledgement of TracePack’s arrival to , then sends RandPack to the next-hop similarly using hop-by-hop TCP connections.
Symbol | Meaning |
---|---|
HotSet of IP addresses to be monitored against SYN-Flood attacks. | |
Frequency of received SYN packets during period t. | |
Frequency of received SYN packets during previous period . | |
Relative change in Frequency of SYN packets. | |
Cumulative mean of Frequency in SYN packets. | |
Current router (edge or core). | |
Next-hop router towards the victim. | |
n | Number of observed periods. |
Threshold acceptable for . | |
Threshold acceptable for . |
Algorithm 1: Pseudo code for the RAPT algorithm at the edge router. |
3.3.2. At the Core Router
- When the core router receives a packet that requires an ACK, this indicates that the received packet could be a TracePack packet. Recall that lines 19 and 21 of Algorithm 1 demand a hop-by-hop TCP connections. To verify this, would lookup its Routing Information Base (RIB) for TracePack’s source IP address. If a match is found and it is one hop away, in addition, TracePack’s destination IP address is not any router’s IP address (i.e., the destination IP for TracePack is a host machine IP address). Given that these two conditions are satisfied, would infer that the received packet is a tracing packet:
- replaces TracePack’s source IP address with its own IP address;
- appends its IP address to the payload of TracePack;
- sends an ACK to to acknowledge receiving TracePack;
- The last four lines of Algorithm 2 are similar to the last four lines of Algorithm 1 that were already discussed.
Algorithm 2: Pseudo code for the RAPT algorithm at the core router. |
3.3.3. At the Victim V
- (i)
- 32 bits for the attacker’s source IP address;
- (ii)
- 16 bits for the identification field of RandPack; and
- (iii)
- The rest of the payload represents the IP addresses of routers in the path, each of which is 32 bits.
4. Performance Evaluation and Results Discussion
4.1. Theoretical Analysis
4.1.1. Convergence Time
- TAPPM: Let be the marking probability for each of the routers, d be the distance between the router and victim, and be the probability, and we obtain the router’s information. The probability of TAPPM is:Then, the convergence time in terms of needed packet m for TAPPM will be:
- RAPT: Due to the nature of RAPT, there will not be any omission, the probability to obtain the farthest routers’ information is thus dependent on . Therefore, the probability of RAPT is:The convergence time will be:Obviously, when 0 < < 1 and d > 1, then:
4.1.2. Path Reconstruction Cost
- TAPPM: This algorithm needs to collect information fragments and perform hash functions on them upon path reconstruction; the algorithm complexity in DDos attack is
- RAPT: Given the pseudo code both in 1 and 2 at the edge routers and core routers respectively, we can analyze and find out that both of them are for both of Dos and DDoS attacks.
4.2. Scenario and Parameters’ Values
- Detection time: This is the time during which the edge router detects the possibility of an attack, and it is the period from the start of the simulation to the beginning of the tracing process;
- Number of SYN packets destined to the victim: This represents the number of SYN packets destined to the victim from the beginning of the simulation until the start of the tracing process for each edge router;
- Tracing time: The time it takes to trace the attack;
- Total processing time: The total time elapsed by the routers on the attack path to carry out the tracing process;
- Convergence time: The time taken by the algorithm to detect, trace and stop the attacks from all incoming paths until the victim receives legitimate SYN packets.
4.3. First Experiment Set with Different Traffic Loads
4.4. Second Experiment Set with Different Topologies
4.5. Comparison with Related Work
- The scheme marks packets with tags carrying the traffic semantics and path information, so that the victim can perceive the distribution of the traffic routed to itself;
- The DDoS traffic discovery is based on traffic volume changes, which allows the victim to trace the attack source generating the malicious traffic and locate the attack point;
- The scheme collaboratively mitigates DDoS based on traffic awareness and IP traceback, which enables the victim location attack points and selecting some hit routers to act as collaborators.
- Convergence Time: This is the time elapsed since the start of attack packets being generated from the attacker(s) until the building of the attack path. The performance of RAPT was compared with TAPPM by running the simulations 15 times over multiple distances, namely, 3, 6, and 9 hops. The results in Figure 11 show that the convergence time is proportional to the distance for both algorithms. This is predictable as the routers on the path need to perform computations and communications for both algorithms; however, RAPT outperforms TAPPM since the attack path will require only one packet to travel between the attacker and the victim. The TAPPM algorithm requires more time and packets from the attacker to realize the attack and select the hit routers, which will mark a significant amount of packets that will be received by the victim to rebuild the attack path.
- Robustness: This metric is used to measure the resilience and scalability of the algorithm against large-scale DDoS attacks. The robustness of RAPT and TAPPM was evaluated in terms of scalability by increasing the number of attackers, that is, when the number of attackers exceeds 15 attackers. Both of the algorithms were evaluated by varying the number of attackers between 5 and 30 running the simulator 15 times for each algorithm and number of attackers. The amount of traffic generated from each attacker is fixed to 5000 packets. The obtained results as depicted in Figure 12 show that, when the number of attackers is less than 15, the average trace time per attack path is better for the TAPPM. This can be due to the fact that, when the number of attackers is low, the attack paths will definitely be low; therefore, less generated attack packets need to be injected in the attack path, which yields a small number of hit routers being collaborative. However, as the number of attackers increases, the average tracing time for the RAPT algorithm significantly performs better. The reason behind this is that the RAPT algorithm is resilient against multi-source/multi-path attacks, thanks to the use of a single tracing packet per path yielding parallel trace packets reaching the victim from multiple sources. Each path is tracked separately without relying on other paths, whereas in the TAPPM algorithm, when the number of attackers increases, the need for a larger number of packets to be marked will increase significantly causing the dramatic increase in average tracing time.
- Computation overhead at the victim: An analytical comparison for both of RAPT and TAPPM is provided. Since the TAPPM algorithm relies on receiving significant amounts of marked packets at the victim where, in the case of large-scale DDoS, the edge-id fragments converge at the victim causing a bottleneck effect. To rebuild a single attack path, the victim has to perform computations on the hashed values embedded in the packets. These computations will cause a heavy burden to be put on the victim extracting different attack paths from multiple sources. Two factors are influencing the performance of TAPPM, the distance and the number of attackers/paths. These two factors negatively affect the performance as either or both increase in amount. The victim must try all combinations in the correct order, which makes it become like solving a puzzle. To elaborate more on this, in Figure 2, the edge-id of R1 and R6 would result in in eight fragments and eight more fragments for the edge-id of R2 and R6. Using combinations, the victim must arrange the correct fragments of each edge-id. Considering this scenario, but in a broader and more complex manner, by increasing the distance on the one hand and increasing the number of attackers on the other hand, this puts a heavy burden on the victim. The proposed RAPT algorithm will only require to recognize the trace packet, know the structure of it, and extract the attack path.
- Backwards Compatibility: An analytical comparison between the RAPT and TAPPM algorithms is provided. Looking through the TAPPM algorithm, it was noted that it violates the IPv4 header specifications for every packet flagged by the hit routers on the path, when the distance between the attacker and the victim increases, the number of packets flagged by the hit routers increases, and this leads to a considerable amount of violations of IPv4 header specifications. However, in the proposed RAPT algorithm, the violation is only for one packet regardless of the distance between the victim and the attacker. Moreover, this packet can be a fragment where the RAPT algorithm uses the value stored in its identification field without the need to overwrite it. This advantage makes the RAPT algorithm not need to change the value of the identification field in the fragment; therefore, it does not lead to a problem in assembling the fragments. If the packet is not a fragment, RAPT changes the value of the identification field (which is set to zero) since it is unused because the packet is a single unit that is not fragmented.
5. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- von Solms, R.; van Niekerk, J. From information security to cyber security. Comput. Secur. 2013, 38, 97–102. [Google Scholar] [CrossRef]
- Mahjabin, T.; Xiao, Y.; Sun, G.; Jiang, W. A survey of distributed denial-of-service attack, prevention, and mitigation techniques. Int. J. Distrib. Sens. Netw. 2017, 13, 1550147717741463. [Google Scholar] [CrossRef] [Green Version]
- NETSCOUT Arbor Confirms 1.7 Tbps DDoS Attack|NETSCOUT. 2018. Available online: https://www.netscout.com/blog/asert/netscout-arbor-confirms-17-tbps-ddos-attack-terabit-attack-era/ (accessed on 14 November 2022).
- Maciel, R.; Araujo, J.; Dantas, J.; Melo, C.; Guedes, E.; Maciel, P. Impact of a DDoS attack on computer systems: An approach based on an attack tree model. In Proceedings of the 2018 Annual IEEE International Systems Conference (SysCon), Vancouver, BC, Canada, 23–26 April 2018; pp. 1–8. [Google Scholar] [CrossRef]
- Praseed, A.; Thilagam, P.S. DDoS Attacks at the Application Layer: Challenges and Research Perspectives for Safeguarding Web Applications. IEEE Commun. Surv. Tutor. 2019, 21, 661–685. [Google Scholar] [CrossRef]
- Tandon, R. A Survey of Distributed Denial of Service Attacks and Defenses. arXiv 2020, arXiv:2008.01345. [Google Scholar] [CrossRef]
- Feng, Y.; Li, J.; Nguyen, T. Application-Layer DDoS Defense with Reinforcement Learning. In Proceedings of the 2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS), Hang Zhou, China, 15–17 June 2020; pp. 1–10. [Google Scholar] [CrossRef]
- Guo, W.; Xu, J.; Pei, Y.; Yin, L.; Jiang, C. LDBT: A Lightweight DDoS Attack Tracing Scheme Based on Blockchain. In Proceedings of the 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada, 14–23 June 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Ranjan, S.; Swaminathan, R.; Uysal, M.; Knightly, E. DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection. In Proceedings of the IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, Barcelona, Spain, 23–29 April 2006; pp. 1–13. [Google Scholar] [CrossRef]
- Yatagai, T.; Isohara, T.; Sasase, I. Detection of HTTP-GET flood Attack Based on Analysis of Page Access Behavior. In Proceedings of the 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Victoria, BC, Canada, 22–24 August 2007; pp. 232–235. [Google Scholar] [CrossRef]
- Seufert, S.; O’Brien, D. Machine Learning for Automatic Defence Against Distributed Denial of Service Attacks. In Proceedings of the 2007 IEEE International Conference on Communications, Glasgow, Scotland, 24–28 June 2007; pp. 1217–1222. [Google Scholar] [CrossRef]
- Yadav, S.; Subramanian, S. Detection of Application Layer DDoS attack by feature learning using Stacked AutoEncoder. In Proceedings of the 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), New Delhi, India, 11–13 March 2016; pp. 361–366. [Google Scholar] [CrossRef]
- Prasad, K.M.; Reddy, A.R.M.; Rao, K.V.G. Anomaly based Real Time Prevention of under Rated App-DDOS Attacks on Web: An Experiential Metrics based Machine Learning Approach. Indian J. Sci. Technol. 2016, 9, 1–10. [Google Scholar] [CrossRef] [Green Version]
- Gagniuc, P.A. Markov chains: From Theory to Implementation and Experimentation; John Wiley & Sons: Hoboken, NJ, USA, 2017. [Google Scholar]
- Xu, C.; Zhao, G.; Xie, G.; Yu, S. Detection on application layer DDoS using random walk model. In Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, Australia, 10–14 June 2014; pp. 707–712. [Google Scholar] [CrossRef]
- Xie, Y.; Yu, S.Z. Monitoring the Application-Layer DDoS Attacks for Popular Websites. IEEE/ACM Trans. Netw. 2009, 17, 15–25. [Google Scholar] [CrossRef]
- Xie, Y.; Yu, S.Z. A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors. IEEE/ACM Trans. Netw. 2009, 17, 54–65. [Google Scholar] [CrossRef]
- Xie, Y.; Yu, S.Z. A Novel Model for Detecting Application Layer DDoS Attacks. In Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS’06), Hangzhou, Zhejiang, 20–24 June 2006; Volume 2, pp. 56–63. [Google Scholar] [CrossRef]
- Savage, S.; Wetherall, D.; Karlin, A.; Anderson, T. Practical Network Support for IP Traceback. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, New York, NY, USA, 28 August 2000; SIGCOMM ’00. 2000; pp. 295–306. [Google Scholar] [CrossRef]
- Savage, S.; Wetherall, D.; Karlin, A.; Anderson, T. Network Support for IP Traceback. IEEE/ACM Trans. Netw. 2001, 9, 226–237. [Google Scholar] [CrossRef] [Green Version]
- Liu, M.; Liu, Y.; Xu, K.; He, L.; Wang, X.; Guo, Y.; Jiang, W. TAP: A Traffic-Aware Probabilistic Packet Marking for Collaborative DDoS Mitigation. In Proceedings of the 2021 17th International Conference on Mobility, Sensing and Networking (MSN), Exeter, UK, 13–15 December 2021; pp. 470–478. [Google Scholar] [CrossRef]
- Nguyen, T.; Mai, H.L.; Cogranne, R.; Doyen, G.; Mallouli, W.; Nguyen, L.; El Aoun, M.; Montes De Oca, E.; Festor, O. Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2470–2485. [Google Scholar] [CrossRef]
- Ouffoue, G.; Ortiz, A.M.; Cavalli, A.R.; Mallouli, W.; Domingo-Ferrer, J.; Sanchez, D.; Zaidi, F. Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach. In Proceedings of the 2016 IEEE 36th International Conference on Distributed Computing Systems Workshops (ICDCSW), Nara, Japan, 27–30 June 2016; pp. 61–66. [Google Scholar] [CrossRef]
- Yin, Z.; Li, K.; Bi, H. Trusted Multi-Domain DDoS Detection Based on Federated Learning. Sensors 2022, 22, 7753. [Google Scholar] [CrossRef] [PubMed]
- Satheesh, N.; Sudha, D.; Suganthi, D.; Sudhakar, S.; Dhanaraj, S.; Sriram, V.P.; Priya, V. Certain improvements to location aided packet marking and ddos attacks in internet. J. Eng. Sci. Technol. 2020, 15, 94–107. [Google Scholar]
- Suresh, S.; Ram, N.S.; Mohan, M. An Optimistic Approach to Interpret the DDoS Attacks By Wielding Deterministic Packet Marking. In Proceedings of the 2019 International Conference on Smart Structures and Systems (ICSSS), Chennai, India, 14–15 March 2019; pp. 1–4. [Google Scholar] [CrossRef]
- Suresh, S.; Sankar Ram, N. Feasible DDoS Attack Source Traceback Scheme by Deterministic Multiple Packet Marking Mechanism. J. Supercomput. 2020, 76, 4232–4246. [Google Scholar] [CrossRef]
- Yeh, L.Y.; Huang, J.L.; Yen, T.Y.; Hu, J.W. A Collaborative DDoS Defense Platform Based on Blockchain Technology. In Proceedings of the 2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media), Bali, Indonesia, 5–8 August 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Sivabalan, S.; Radcliffe, P.J. A novel framework to detect and block DDoS attack at the application layer. In Proceedings of the IEEE 2013 Tencon-Spring, Sydney, Australia, 17–19 April 2013; pp. 578–582. [Google Scholar] [CrossRef]
- Zhang, H.; Taha, A.; Trapero, R.; Luna, J.; Suri, N. SENTRY: A Novel Approach for Mitigating Application Layer DDoS Threats. In Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23–26 August 2016; pp. 465–472. [Google Scholar] [CrossRef]
- Moustis, D.; Kotzanikolaou, P. Evaluating security controls against HTTP-based DDoS attacks. In Proceedings of the IISA 2013, Piraeus, Greece, 10–12 July 2013; pp. 1–6. [Google Scholar] [CrossRef]
- Smith, J.M.; Schuchard, M. Routing Around Congestion: Defeating DDoS Attacks and Adverse Network Conditions via Reactive BGP Routing. In Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 21–23 May 2018; pp. 599–617. [Google Scholar] [CrossRef]
- Bawany, N.Z.; Shamsi, J.A.; Salah, K. DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions. Arab. J. Sci. Eng. 2017, 42, 425–441. [Google Scholar] [CrossRef]
- Bhattacharyya, D.K.; Kalita, J.K. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance; Chapman & Hall/CRC: London, UK, 2016. [Google Scholar]
- Imperva. Imperva, Global DDoS Threat Landscape, 2019 Report; Technical Report; Imperva: Austin, TX, USA, 2019. [Google Scholar]
- Li, P.; Feng, Y.; Kawamoto, J.; Sakurai, K. A Proposal for Cyber-Attack Trace-Back Using Packet Marking and Logging. In Proceedings of the 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Fukuoka, Japan, 6–8 July 2016; pp. 603–607. [Google Scholar] [CrossRef]
- Sanap, S.M.; Pawar, P. sOverview of IP tracebacking using packet marking techniques. In Proceedings of the 2015 International Conference on Advances in Computer Engineering and Applications, Ghaziabad, India, 19–20 March 2015; pp. 816–820. [Google Scholar] [CrossRef]
- Heimlicher, S.; Nuggehalli, P.; May, M. End-to-End vs. Hop-by-Hop Transport. SIGMETRICS Perform. Eval. Rev. 2007, 35, 59–60. [Google Scholar] [CrossRef]
- Varga, A.; Hornig, R. An overview of the OMNeT++ simulation environment. In Proceedings of the Simutools ’08: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops; ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering): ICST, Brussels, Belgium, 3–7 March 2008; pp. 1–10. [Google Scholar]
- Chakrabarti, D.; Faloutsos, C. Graph Mining: Laws, Generators, and Algorithms. ACM Comput. Surv. 2006, 38, 2. [Google Scholar] [CrossRef]
- Bollobás, B. Random Graphs; Cambridge University Press: Cambridge, UK, 2001. [Google Scholar]
- Amah, T.E.; Kamat, M.; Moreira, W.; Abu Bakar, K.; Mandala, S.; Batista, M.A. Towards next-generation routing protocols for pocket switched networks. J. Netw. Comput. Appl. 2016, 70, 51–88. [Google Scholar] [CrossRef]
- Mahajan, R.; Bellovin, S.M.; Floyd, S.; Ioannidis, J.; Paxson, V.; Shenker, S. Controlling High Bandwidth Aggregates in the Network. SIGCOMM Comput. Commun. Rev. 2002, 32, 62–73. [Google Scholar] [CrossRef] [Green Version]
- Frankel, S.; Krishnan, S. IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap; RFC 6071; Internet Engineering Task Force (IETF): Fremont, CA, USA, 2011. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
AlArnaout, Z.; Mostafa, N.; Alabed, S.; Aly, W.H.F.; Shdefat, A. RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks. Sensors 2023, 23, 102. https://doi.org/10.3390/s23010102
AlArnaout Z, Mostafa N, Alabed S, Aly WHF, Shdefat A. RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks. Sensors. 2023; 23(1):102. https://doi.org/10.3390/s23010102
Chicago/Turabian StyleAlArnaout, Zakwan, Nour Mostafa, Samer Alabed, Wael Hosny Fouad Aly, and Ahmed Shdefat. 2023. "RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks" Sensors 23, no. 1: 102. https://doi.org/10.3390/s23010102
APA StyleAlArnaout, Z., Mostafa, N., Alabed, S., Aly, W. H. F., & Shdefat, A. (2023). RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks. Sensors, 23(1), 102. https://doi.org/10.3390/s23010102