Skip to main content

Active Host Information-Based Abnormal IP Address Detection

  • Conference paper
Networking - ICN 2005 (ICN 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3421))

Included in the following conference series:

  • 547 Accesses

Abstract

In this paper, we propose an abnormal IP address detection scheme, which is capable of detecting IP spoofing and network scan attacks. Our scheme learns active host information such as incoming interface number, whether or not working as Web server, whether or not working as DNS server, and etc., by collecting and verifying flow information on networks. By using active host information learned, we can check if IP address is normal or abnormal. Through simulation, the performance of the proposed scheme is evaluated. The simulation results show that our scheme is able to detect source IP spoofing attacks that forge using the IP address of subnet that attacker belongs to as well as using the external IP address. And also, they show that our scheme is able to detect network scan attacks with low false alarm rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Northcutt, S., Novak, J.: Network Intrusion Detection: An Analyst’s Handbook, 2nd edn. New Riders Publishing, Indianapolis (2000)

    Google Scholar 

  2. Leckie, C., Kotagiri, R.: A Probabilistic Approach to Detecting Network Scans. In: IEEE Network Operations and Management Symposium, pp. 359–372 (2002)

    Google Scholar 

  3. Schechter, S., Jung, J., Berger, A.W.: Fast Detection of Scanning Worm Infections. In: 7th International Symposium on Recent Advances in Intrusion Detection (September 2004)

    Google Scholar 

  4. Twycross, J., Williamson, M.M.: Implementing and testing a virus throttle. In: Proceedings of the 12th USENIX Security Symposium (August 2003)

    Google Scholar 

  5. Templeton, S.J., Levitt, K.E.: Detecting Spoofed Packets. In: DARPA Information Survivability Conference and Exposition (April 2003)

    Google Scholar 

  6. Houle, K.J., Weaver, G.M.: Trends in Denial of Service Attack Technology, The fall 2001 NANOG meeting (October 2001)

    Google Scholar 

  7. Cisco, Unicast Reverse Path Forwarding (uRPF) Enhancements for the ISP-ISP Edge (February 2001), http://www.cisco.com/.../uRP_Enhancement.pdf

  8. Ferguson, P., Senie, D.: Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing, RFC 2827 (May 2000)

    Google Scholar 

  9. Savage, S., Karlin, A., Anderson, T.: Network Support for IP Traceback. IEEE/ACM Transactions on Networking 9(3), 226–237 (2001)

    Article  Google Scholar 

  10. Bellovin, S., Leech, M., Taylor, T.: ICMP Traceback Messages, Internet draft (October 2001)

    Google Scholar 

  11. Lee, W., Stolfo, S., Mok, K.: Mining in a Data-flow Environment: Experience in Network Intrusion Detection. In: Proceedings of the 5th ACM International Conference on Knowledge Discovery and Data Mining (KDD 1999) (August 1999)

    Google Scholar 

  12. UCB/LBNL/VINT, ns Notes and Documentation, http://www.isi.edu/nsnam/ns

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ahn, G., Kim, K. (2005). Active Host Information-Based Abnormal IP Address Detection. In: Lorenz, P., Dini, P. (eds) Networking - ICN 2005. ICN 2005. Lecture Notes in Computer Science, vol 3421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31957-3_78

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31957-3_78

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25338-9

  • Online ISBN: 978-3-540-31957-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics