Browse > Article

A Verification of Intruder Trace-back Algorithm using Network Simulator (NS-2)  

Seo Dong-il (한국전자통신연구원 네트워크보안구조연구팀)
Kim Hwan-kuk (한국전자통신연구원 네트워크보안연구부)
Lee Sang-ho (충북대학교 전기전자컴퓨터공학부)
Abstract
Internet has become an essential part of our daily lives. Many of the day to day activities can already be carried out over Internet, and its convenience has greatly increased the number of Internet users. Hut as Internet gains its popularity, the illicit incidents over Internet has also proliferated. The intruder trace-back technology is the one that enables real time tracking the position of the hacker who attempts to invade the system through the various bypass routes. In this paper, the RTS algorithm which is the TCP connection trace-back system using the watermarking technology on Internet is proposed. Furthermore, the trace-bark elements are modeled by analyzing the Proposed trace-back algorithm, and the results of the simulation under the virtual topology network using ns-2, the network simulation tool are presented.
Keywords
Network Security; Trace-back; Hacking; Simulation; Information Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Staniford-Chen and L. T. Heberlein. 'Holding Intruders Accountable on the Internet,' In Proceedings of the 1995 IEEE Symposium on Security and Privacy, pp.39-49, 1995   DOI
2 Y. Zhang and V. Paxson, 'Detecting Stepping Stones,' Proceedings of 9th USENIX Security Symposium, pp.171-184, 2000
3 최양서, 서동일, 손승원, '역추적 기술 동향(TCP Connection traceback 중심)', ETRI 주간 기술 동향, 제1079호, pp13-25. 2003
4 최양서, 김환국, 서동일, 이상호, 'Connection Redirection 기법을 이용한 네트워크기반 실시간 연결 역추적 시스템의 설계', COMSW2003, pp.115-119, 2003
5 H. T. lung et al. 'Caller Identification System in the Internet Environment,' Proceedings of the 4th Usenix Security Symposium, pp.69-73, 1993
6 Chaeho Lim, 'Semi-Auto Intruder Retracing Using Autonomous Intrusion Analysis Agent,' FIRST Conference on Computer Security Incident Handling & Response 1999, 1999
7 X. Wang, D. Reeves, S. F. Wu, and J. Yuill, 'Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework,' Proceedings of IFIP Conference on Security, pp.369-384, 2001
8 Yangseo Choi, Dongil Seo, Seungwon Sohn, Sangho Lee, 'Network-Based Real-Time Connection Traceback System(NRCTS) with Packet Marking Technology,' In Proceedings of the 2003 International Conference on Computational Science and Its Applications, pp.31-40, 2003
9 K. Yoda and H. Etoh, 'Finding a Connection Chain for Tracing Intruders,' 6th European Symposium on Research in Computer Security-ESORICS 2000 LNCS -1985, pp.191-205, 2000