TY - GEN
T1 - Rate-based watermark traceback
T2 - 6th International Conference on Information Security Practice and Experience, ISPEC 2010
AU - Liu, Zongbin
AU - Jing, Jiwu
AU - Liu, Peng
N1 - Funding Information:
The work is supported by the National Natural Science Foundation of China under Grant No. 70890084/G021102; and the National High-Tech Research and Development Plan of China under Grant No. 2006AA01Z454.
PY - 2010
Y1 - 2010
N2 - Network based intrusions have become a serious threat to Internet users. Despite many sophisticated defense techniques, attacks continue to increase. At present, in order to hide the source of the attack, many attackers prefer a stepping stone to launch their attack due to the anonymous nature of the Internet. The size, header and content of an IP packet will be changed because of the stepping stone and all these changes make it more difficult to trace the source of attacks. Currently, researchers study the time interval between IP packets and embed the watermark into the packet stream by adjusting the time interval between IP packets to trace the source of attacks. In this paper we study the previous watermarking schemes based on inter packet delay and propose a novel watermark scheme based on the rate of packets. For the first time we used weak signal detection model and cluster technology to resume the watermark, so as to avoid the present schemes which are based on precision time synchronization or packet number. Simulation tests show that the novel watermark is robust and can countermine the time perturbation, packet losing perturbation and packet padding perturbation caused by an attacker on purpose.
AB - Network based intrusions have become a serious threat to Internet users. Despite many sophisticated defense techniques, attacks continue to increase. At present, in order to hide the source of the attack, many attackers prefer a stepping stone to launch their attack due to the anonymous nature of the Internet. The size, header and content of an IP packet will be changed because of the stepping stone and all these changes make it more difficult to trace the source of attacks. Currently, researchers study the time interval between IP packets and embed the watermark into the packet stream by adjusting the time interval between IP packets to trace the source of attacks. In this paper we study the previous watermarking schemes based on inter packet delay and propose a novel watermark scheme based on the rate of packets. For the first time we used weak signal detection model and cluster technology to resume the watermark, so as to avoid the present schemes which are based on precision time synchronization or packet number. Simulation tests show that the novel watermark is robust and can countermine the time perturbation, packet losing perturbation and packet padding perturbation caused by an attacker on purpose.
UR - http://www.scopus.com/inward/record.url?scp=78650280311&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78650280311&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-12827-1_13
DO - 10.1007/978-3-642-12827-1_13
M3 - Conference contribution
AN - SCOPUS:78650280311
SN - 3642128262
SN - 9783642128264
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 172
EP - 186
BT - Information Security Practice and Experience - 6th International Conference, ISPEC 2010, Proceedings
Y2 - 12 May 2010 through 13 May 2010
ER -