IP traceback using digital watermark and honeypot

2Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Nowadays, The widespread networks are intensively threatened by Internet attack. It's highly urgent to traceback the attack origination, neutralize the attack and punish the malicious attackers. There are many IP traceback methods, but none of the existing solutions can fulfill all the effective traceback requirements. This paper proposed a novel IP traceback scheme. In this scheme, an elaborate digital watermark is put into a honeypot, and the probe-scan-entrap the attacks through the honeypot, which sequentially induces the attacks to visit the digital watermark. Thus in the overlay network, the trail of the digital watermark will reconstruct the attack route so that the hacker's address can be located. It is very difficult to carry out single packet traceback in traditional methods and their measures heavily depend on the router capability, the network administrators' and co-operation between ISPs. Our proposal has solved such problems and it can against attacks through proxy or slave hosts. © 2008 Springer-Verlag Berlin Heidelberg.

Author supplied keywords

Cite

CITATION STYLE

APA

Yi, Z., Pan, L., Wang, X., Huang, C., & Huang, B. (2008). IP traceback using digital watermark and honeypot. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5061 LNCS, pp. 426–438). https://doi.org/10.1007/978-3-540-69293-5_34

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free