Towards Security Metrics-Supported IP Traceback

Reijo Savola, Pekka Savolainen, Jarno Salonen

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Abstract

    The threat of DDOS and other cyberattacks has increased during the last decade. In addition to the radical increase in the number of attacks, they are also becoming more sophisticated with the targets ranging from ordinary users to service providers and even critical infrastructure. According to some resources, the sophistication of attacks is increasing faster than the mitigating actions against them. For example determining the location of the attack origin is becoming impossible as cyber attackers employ specific means to evade detection of the attack origin by default, such as using proxy services and source address spoofing. The purpose of this paper is to initiate discussion about effective Internet Protocol traceback mechanisms that are needed to overcome this problem. We propose an approach for traceback that is based on extensive use of security metrics before (proactive) and during (reactive) the attacks.
    Original languageEnglish
    Title of host publicationECSAW '16 Proccedings of the 10th European Conference on Software Architecture Workshops
    PublisherAssociation for Computing Machinery ACM
    ISBN (Print)978-1-4503-4781-5
    DOIs
    Publication statusPublished - 2016
    MoE publication typeNot Eligible
    Event10th European Conference on Software Architecture Workshops, ECSAW'16 - University of Copenhagen, Copenhagen, Denmark
    Duration: 28 Nov 20162 Dec 2016
    Conference number: 10
    http://ecsa2016.icmc.usp.br/

    Conference

    Conference10th European Conference on Software Architecture Workshops, ECSAW'16
    Abbreviated titleECSAW'16
    Country/TerritoryDenmark
    CityCopenhagen
    Period28/11/162/12/16
    Internet address

    Keywords

    • cybersecurity
    • traceback
    • security metrics

    Fingerprint

    Dive into the research topics of 'Towards Security Metrics-Supported IP Traceback'. Together they form a unique fingerprint.

    Cite this