Deakin University
Browse

File(s) under permanent embargo

An effective and feasible traceback scheme in mobile internet environment

journal contribution
posted on 2014-11-01, 00:00 authored by Shui Yu, Keshav SoodKeshav Sood, Yong XiangYong Xiang
Around one billion people access the Internet using their mobile phones today, and many of the mobile phones are prone to be compromised by hackers due to their inherited vulnerability. It is critical to identify these compromised mobile phones to effectively eliminate cyber attacks. However, we see few research works in the field. In order to address this desperate situation, we design a practical traceback framework to identify active compromised mobiles in the mobile Internet environment in this letter. In the proposed framework, we creatively use the IMEI number of mobile hardware as unique marks for the traceback purpose. Two-layer traceback tables are designed to collect global attack information and identify local attacking bots, respectively. Our analysis and simulation demonstrate that the proposed traceback method is effective and feasible, and it can identify every possible attacking mobile in the current mobile Internet environment with single packet marking.

History

Journal

IEEE Communications Letters

Volume

18

Issue

11

Pagination

1911 - 1914

Publisher

Institute of Electrical and Electronics Engineers Inc.

Location

NJ, United States

ISSN

1089-7798

Language

eng

Publication classification

C Journal article; C1 Refereed article in a scholarly journal

Copyright notice

2014, Institute of Electrical and Electronics Engineers