A Survey on Novel Flow Marking IP Traceback Schemes
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 12)Publication Date: 2014-12-05
Authors : S. M. Chaware; Shubhangi R. Sardar;
Page : 194-197
Keywords : DDoS Attack; IP Traceback; Packet Marking;
Abstract
In recent years, communication and data stored over the World Wide Web (www) increased enormously. At the same time attacks over internet have increased. As a result, lots of researches have been done on securing the internet infrastructure. Due to trusting nature of IP, the source address of a packet is never authenticated. This leads to the need of some technique to find the source of transmitted packet. IP traceback has become widely used technique for these researches. In previous IP traceback methods, finding exact source of attack and reconstructing the attack path was two major issues. Deterministic Flow Marking (DFM) provides an innovative approach to overcome these issues. It traces the origin of spoofed source IP Address of attacker node and provides an optional authentication approach for the victim. In this paper, a wide survey has been carried out to identify and classify the existing IP traceback schemes.
Other Latest Articles
- Impacts of Twelve Weeks Resistance Training and Sprinting After Resistance Training on Maximum Speed Maximum Leg Power and Elastic Leg Strength of Basketball Players
- Survey of Adaptive Novel Class Detection and Classification of Feature-Evolving Data Streams
- Travelling Salesman Problem (TSP) Using Fuzzy Quantifier
- Role of Ultrasound and Colour Doppler in Scrotal Pain
- Enabling Indirect Mutual Trust and Secure Login Mechanism for Cloud Computing Storage Systems
Last modified: 2021-06-30 21:15:01