Finding DDoS attack sources: Searchlight localization algorithm for network tomography

Among the challenges facing the Internet, DoS/DDoS are a critical concern for Internet Service Providers. DDoS attacks can cause country-wide infrastructure problems, and can disrupt communications on a national level. Frequently, Botnets are used to carry out source-spoofed DDoS attacks. The proble...

Full description

Saved in:
Bibliographic Details
Published in:2011 7th International Wireless Communications and Mobile Computing Conference pp. 418 - 423
Main Authors: Demir, Omer, Khan, Bilal
Format: Conference Proceeding
Language:English
Published: IEEE 01.07.2011
Subjects:
ISBN:9781424495399, 1424495393
ISSN:2376-6492
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Among the challenges facing the Internet, DoS/DDoS are a critical concern for Internet Service Providers. DDoS attacks can cause country-wide infrastructure problems, and can disrupt communications on a national level. Frequently, Botnets are used to carry out source-spoofed DDoS attacks. The problem of tracing such attacks has been the subject of significant inquiry. Here, we leverage the fact that a Botnet requires significant exposure to risk, and investments of time and resources. Thus, as a capital resource, it is likely that a Botnet will, over its lifespan, be used to execute multiple criminal DDoS attacks on different targets. Here, we report on new techniques that leverage information obtained over sequences of source spoofed Botnet led DDoS attacks, demonstrating the efficacy of these techniques at pinpointing potential attacker locations. DDoS attack flow descriptions can be collected in many ways, using a coordinated DDoS sensor agents (e.g. as described by the authors previously in). Here, as a theoretical contribution, we provide formal statement of the attacker localization problem. We develop an new algorithm for localizing attack sources from sequences of DDoS attacks.
AbstractList Among the challenges facing the Internet, DoS/DDoS are a critical concern for Internet Service Providers. DDoS attacks can cause country-wide infrastructure problems, and can disrupt communications on a national level. Frequently, Botnets are used to carry out source-spoofed DDoS attacks. The problem of tracing such attacks has been the subject of significant inquiry. Here, we leverage the fact that a Botnet requires significant exposure to risk, and investments of time and resources. Thus, as a capital resource, it is likely that a Botnet will, over its lifespan, be used to execute multiple criminal DDoS attacks on different targets. Here, we report on new techniques that leverage information obtained over sequences of source spoofed Botnet led DDoS attacks, demonstrating the efficacy of these techniques at pinpointing potential attacker locations. DDoS attack flow descriptions can be collected in many ways, using a coordinated DDoS sensor agents (e.g. as described by the authors previously in). Here, as a theoretical contribution, we provide formal statement of the attacker localization problem. We develop an new algorithm for localizing attack sources from sequences of DDoS attacks.
Author Khan, Bilal
Demir, Omer
Author_xml – sequence: 1
  givenname: Omer
  surname: Demir
  fullname: Demir, Omer
  email: omerdemirkos@gmail.com
  organization: Gen. Directorate of Security, Dept. of Inf. Technol., Turkish Nat. Police, Ankara, Turkey
– sequence: 2
  givenname: Bilal
  surname: Khan
  fullname: Khan, Bilal
  email: bkhan@jjay.cuny.edu
  organization: Dept. of Math. & Comput. Sci., CUNY, New York, NY, USA
BookMark eNo1kL1OwzAYAI0oEm3pC8DiF0jx57_YbCilUKmIofyMleM4iWkaV44RKk_PQJlOt9xwEzTqQ-8QugYyByD6dvVRPBdzSgDmQisqcnKGJsAp51owJc7RTOfq37UeoTFlucwk1_QSzYbhkxDCKEBO-Ri9L31f-b7Bi0XYYJOSsTs8hK9o3XCHN85E23a-aRPugjWd_zHJhx6brgnRp3aP6xBx79J3iDucwj400Rza4xW6qE03uNmJU_S2fHgtnrL1y-OquF9nHnKRskpKq0vQ4HiZ05IxXVNmBFGVVtJxZ5Sj4IhSIPNaV6W1zirKhTCyKoFRNkU3f13vnNseot-beNyetrBfsOBXHg
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/IWCMC.2011.5982570
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 1424495385
9781424495375
1424495377
9781424495382
EndPage 423
ExternalDocumentID 5982570
Genre orig-research
GroupedDBID 6IE
6IL
6IN
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-i175t-d66c9b191e4b72b339f23a508d986e4ea8e21e088167f9dbccec82455a6db1323
IEDL.DBID RIE
ISBN 9781424495399
1424495393
ISICitedReferencesCount 4
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000300570200072&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2376-6492
IngestDate Wed Aug 27 03:23:46 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-d66c9b191e4b72b339f23a508d986e4ea8e21e088167f9dbccec82455a6db1323
PageCount 6
ParticipantIDs ieee_primary_5982570
PublicationCentury 2000
PublicationDate 2011-July
PublicationDateYYYYMMDD 2011-07-01
PublicationDate_xml – month: 07
  year: 2011
  text: 2011-July
PublicationDecade 2010
PublicationTitle 2011 7th International Wireless Communications and Mobile Computing Conference
PublicationTitleAbbrev IWCMC
PublicationYear 2011
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0003211724
ssj0000670004
Score 1.7939844
Snippet Among the challenges facing the Internet, DoS/DDoS are a critical concern for Internet Service Providers. DDoS attacks can cause country-wide infrastructure...
SourceID ieee
SourceType Publisher
StartPage 418
SubjectTerms Computer crime
Computer hacking
DDoS
Electronic mail
Internet
Investments
Routing
Silicon
source localization
source spoofing
Title Finding DDoS attack sources: Searchlight localization algorithm for network tomography
URI https://ieeexplore.ieee.org/document/5982570
WOSCitedRecordID wos000300570200072&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3JTsMwELVKxQEuLC1ilw8cMW3jxAvXlgokqCqx9VbZzgSitglqU74f20kLSFy4xZGiWLbkmTd-7w1CF4ZJY4RShAvNSZjEhtgzTxAG2mbbARiVeBPXez4YiNFIDmvocq2FAQBPPoMr9-jv8uPcLF2prOXM5iJuAfoG56zUaq3rKV5vUkELN6YW2XDf09bxPggLZbDSdcmISrqye6rGciWoacvW3Wv3oVu6e1Z__NV6xUee_s7_5ryLmt8SPjxcB6c9VINsH23_cB9soJd-6iUtuNfLH7EqCmUmuCzmL65xyUOeOuyOfcCrBJtYTd_yeVq8z7DNd3FW0shxkc8q8-smeu7fPHVvSdVmgaQ2dyhIzJiR2uI2CDUPNKUyCaiyiVssBYMQlICgA_Y06jCeyFgbA0YEYRQpFmsLZukBqmd5BocIg4iYCIU01PnIBUZbgKTt97QNVLOOOUINt0Ljj9JJY1wtzvHfr0_QVlnBdeTYU1Qv5ks4Q5vms0gX83O__V8jiaoY
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1dT8IwFG2ImqgvfoDx2z74aAXWrWt9BQlEICSi8kba7k4XgRkY_n7bbqAmvvi2LlnWNE3vPbfnnIvQtWZCay4lCbkKiR9HmpgzjxMGymTbHmgZOxPXbtjv89FIDEroZq2FAQBHPoNb--ju8qNUL22prGrN5oLQAPTNwPe9Wq7WWldUnOKkABd2TA22CV1XW8v8IMwX3krZJQIq6MrwqRiLlaSmJqqdl0avkft7Fv_81XzFxZ7W3v9mvY8q3yI-PFiHpwNUgtkh2v3hP1hGz63EiVpws5k-YpllUr_jvJy_uMM5E3li0Tt2Ia-QbGI5eU3nSfY2xSbjxbOcSI6zdFrYX1fQU-t-2GiTotECSUz2kJGIMS2UQW7gq9BTlIrYo9KkbpHgDHyQHLw6mPOozsJYREpr0Nzzg0CySBk4S4_QxiydwTHCwAPGfS40tU5ynlYGIinzPa0BVayuT1DZrtD4I_fSGBeLc_r36yu03R72uuNup_9whnbyeq6lyp6jjWy-hAu0pT-zZDG_dFvhCzJprV8
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2011+7th+International+Wireless+Communications+and+Mobile+Computing+Conference&rft.atitle=Finding+DDoS+attack+sources%3A+Searchlight+localization+algorithm+for+network+tomography&rft.au=Demir%2C+Omer&rft.au=Khan%2C+Bilal&rft.date=2011-07-01&rft.pub=IEEE&rft.isbn=9781424495399&rft.issn=2376-6492&rft.spage=418&rft.epage=423&rft_id=info:doi/10.1109%2FIWCMC.2011.5982570&rft.externalDocID=5982570
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2376-6492&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2376-6492&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2376-6492&client=summon