Skip to main content

A New Proactive Defense Model Based on Intrusion Deception and Traceback

  • Conference paper
Information Security and Cryptology (Inscrypt 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4990))

Included in the following conference series:

  • 606 Accesses

Abstract

Along with the fast development of the Internet, the traditional passive defense measures have shortcomings and can not deal with the increasingly serious network security problems better. In this paper, a proactive network defense scheme is presented. And a new model of DTPM (Intrusion Deception and Traceback-based Proactive Defense Model) is established, which protects the precious network resources with the cooperation of intrusion deception and traceback. In the traceback module of DTPM, an improved approach APPM based on the PPM (Probabilistic Packet Marking) is developed, which makes up for the deficiency of the PPM in real-time capability and flexibility. By way of analyzing and comparing with other methods, this approach can decrease the overloads of many aspects and make traceback more efficient. The simulation experiment indicates the high performance and efficiency of this scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shu-fan, Y., Fang-min, L., Jian-qiu, J., et al.: Constitute the passive infrastructure in network [J]. Journal of China Institute of Communications 24(7), 170–175 (2003)

    Google Scholar 

  2. Gubbels, K.: Hands in the Honeypot (2002–03), http://www.sans.Org/rr/-white-papers/detection/365.php

  3. Honeypots Solutions: So you want to build your own honeypot, http://www.tracking-hacker.com/solutions/

  4. Bellovin, S.M.: ICMP traceback messages, Internet draft (February 2003), ftp://ftp.ietf.org/internet-drafts/draft-ietf-itrace-04.txt

  5. Savage, S., Wetherall, D., Karlin, A., et al.: Network support for IP traceback[J]. ACM/IEEE Transactions on Networking 9(3), 226–237 (2001)

    Article  Google Scholar 

  6. Chun-he, X., Xiao-jian, L., Xin-ping, Z.: Research on Intrusion-Deception-Based Dynamic Network Defense[J]. Chinese Journal of Computers 27(12), 1585–1592 (2004)

    Google Scholar 

  7. Spitzner, L.: Honeypot: Definitions and Value of Honeypots (2005-5), http://www.Tracking-hackers.com/papers/honeypot.html

  8. Honeynet Project: Know Your Enemy: Honeynets, http://www.honeynet.org

  9. Qiang, L., Hong-zi, Z., Meng, Z., et al.: CoMM: Real-Time IP Traceback Model Based on Cooperative Marking and Mitigation[J]. Mini-Micro Systems 27(5), 769–773 (2006)

    Google Scholar 

  10. Theilmann, W., Rothermel, K.: Dynamic distance maps of the Internet[C]. In: Proceedings of the 2000 IEEE INFOCOM Conference, March 2000, pp. 275–284 (2000)

    Google Scholar 

  11. Song, D.X., Perrig, A.: Advanced and Authenticated Marking Schemes for IP Traceback[C]. In: Proceedings of the IEEE INFOCOM, pp. 878–886 (2001)

    Google Scholar 

  12. The Network Simulator-ns-2.[EB/OL] (2003), http://www.isi.edu/nsnam/ns

  13. Internet mapping[EB/OL] (1999), http://cm.bell-labs.com/who/ches/map/dbs/index.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Dingyi Pei Moti Yung Dongdai Lin Chuankun Wu

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tian, J., Li, N. (2008). A New Proactive Defense Model Based on Intrusion Deception and Traceback. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds) Information Security and Cryptology. Inscrypt 2007. Lecture Notes in Computer Science, vol 4990. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-79499-8_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-79499-8_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-79498-1

  • Online ISBN: 978-3-540-79499-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics