DocumentCode
1764005
Title
An Effective and Feasible Traceback Scheme in Mobile Internet Environment
Author
Shui Yu ; Sood, Keshav ; Yong Xiang
Author_Institution
Fac. of Sci., Eng., & Built Environ., Deakin Univ., Burwood, VIC, Australia
Volume
18
Issue
11
fYear
2014
fDate
Nov. 2014
Firstpage
1911
Lastpage
1914
Abstract
Around one billion people access the Internet using their mobile phones today, and many of the mobile phones are prone to be compromised by hackers due to their inherited vulnerability. It is critical to identify these compromised mobile phones to effectively eliminate cyber attacks. However, we see few research works in the field. In order to address this desperate situation, we design a practical traceback framework to identify active compromised mobiles in the mobile Internet environment in this letter. In the proposed framework, we creatively use the IMEI number of mobile hardware as unique marks for the traceback purpose. Two-layer traceback tables are designed to collect global attack information and identify local attacking bots, respectively. Our analysis and simulation demonstrate that the proposed traceback method is effective and feasible, and it can identify every possible attacking mobile in the current mobile Internet environment with single packet marking.
Keywords
Internet; computer network security; mobile radio; IMEI number; cyber attack elimination; global attack information; local attacking bots; mobile Internet environment; mobile hardware; mobile phones; single packet marking; traceback scheme; two-layer traceback tables; IP networks; Internet; Logic gates; Mobile communication; Mobile handsets; Servers; Wireless application protocol; Traceback; attack source; mobile Internet;
fLanguage
English
Journal_Title
Communications Letters, IEEE
Publisher
ieee
ISSN
1089-7798
Type
jour
DOI
10.1109/LCOMM.2014.2361864
Filename
6918391
Link To Document