Academic Journals Database
Disseminating quality controlled scientific knowledge

IP Trace Back Scheme for Packet Marking and Packet Logging Using RIHT

ADD TO MY LIST
 
Author(s): C. VAIYAPURI | R. MOHANDAS

Journal: International Journal of Computer Science and Mobile Computing
ISSN 2320-088X

Volume: 2;
Issue: 4;
Start page: 429;
Date: 2013;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: DoS attack | DDoS attack | hybrid IP trace back | IP spoofing | packet logging | packet marking

ABSTRACT
Internet Protocol trace back is the enabling technology to control the crime. Internet Protocolpacket is to find the real source of Internet attacks, we must possess the capability of discovering the origin ofIP packets without relying on the source IP address field. This capability is called IP trace back. IP traceback systems provide a means to identify true sources of IP packets without relying on the source IP addressfield of the packet header, and are the major technique to find the real attack sources. In this project wepresent an IP trace back system called Deterministic Packet Marking and with packet logging whichprovides [1] a defense system with the ability to find out the real sources of attacking packets that traversethrough the network. While a number of other trace back schemes exist, we propose a new hybrid IP traceback scheme with efficient packet logging aiming to have a fixed storage requirement for each router inpacket logging without the need to refresh the logged tracking information and to achieve zero false positiveand false negative rates in attack-path reconstruction.
Save time & money - Smart Internet Solutions      Why do you need a reservation system?