TY - GEN
T1 - The design and implementation of a practical meta-heuristic for the detection and identification of denial-of-service attack using hybrid approach
AU - Chen, Hsia Hsiang
AU - Yang, Wuu
PY - 2010/6/8
Y1 - 2010/6/8
N2 - Network attacks are occurring continuously day after day. The researchers are expected to find the solution by identifying the address of source. We propose the IP traceback ant colony system (ITACS) algorithm to solve the IP traceback of denial of service (DoS) problem. The ITACS is novel attempted to apply in solving the problem. It is a meta-heuristic algorithm, which is a technique applies so that attack detection and attack identification can be implemented. The proposed algorithm has improved by the previous one to conquer this problem successfully. We obtained the data set of topology from one of famous research organizations for the experiment. The parameters of algorithm are considered by packet contents in topology. In the meanwhile, we discussed the increment of traffic condition. By the experiment, the examples of increment of traffic are above average 70%. The results show that the performance of ITACS algorithm is efficient and accurate. Furthermore, the proposed algorithm has also nature of robust for the problem. Future work may even be extended to study the other behaviors of organisms from derivations of meta-heuristic algorithm.
AB - Network attacks are occurring continuously day after day. The researchers are expected to find the solution by identifying the address of source. We propose the IP traceback ant colony system (ITACS) algorithm to solve the IP traceback of denial of service (DoS) problem. The ITACS is novel attempted to apply in solving the problem. It is a meta-heuristic algorithm, which is a technique applies so that attack detection and attack identification can be implemented. The proposed algorithm has improved by the previous one to conquer this problem successfully. We obtained the data set of topology from one of famous research organizations for the experiment. The parameters of algorithm are considered by packet contents in topology. In the meanwhile, we discussed the increment of traffic condition. By the experiment, the examples of increment of traffic are above average 70%. The results show that the performance of ITACS algorithm is efficient and accurate. Furthermore, the proposed algorithm has also nature of robust for the problem. Future work may even be extended to study the other behaviors of organisms from derivations of meta-heuristic algorithm.
KW - Denial of service
KW - IP traceback ant colony system
KW - Meta-heuristic algorithm
UR - http://www.scopus.com/inward/record.url?scp=77953077992&partnerID=8YFLogxK
U2 - 10.1109/ICMLC.2010.46
DO - 10.1109/ICMLC.2010.46
M3 - Conference contribution
AN - SCOPUS:77953077992
SN - 9780769539775
T3 - ICMLC 2010 - The 2nd International Conference on Machine Learning and Computing
SP - 47
EP - 51
BT - ICMLC 2010 - The 2nd International Conference on Machine Learning and Computing
T2 - 2010 The 2nd International Conference on Machine Learning and Computing, ICMLC 2010
Y2 - 9 February 2010 through 11 February 2010
ER -