A Survey on IP Traceback Mechanisms
Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 8)Publication Date: 2016-08-05
Authors : Aparna C Bhadran; Maria Joy;
Page : 1262-1265
Keywords : Ingress Filtering; Link testing; Logging; ICMP traceback; Packet Marking;
Abstract
Security is used to protect the vital information by allowing those who have the right to access and denying the access to those who dont have right. IP spoofing is one of the network attacks. The attackers will launch an attack by forging the source address. So they will be able to enhance the attacking without exposing their real location. The attackers uses fake source IP address to hide their actual places. To find the attackers so many IP traceback mechanisms have been proposed in this paper.
Other Latest Articles
- Survey on Edge-Preserving Decomposition-Based Single Image Haze Removal
- Dynamic Analysis of Laminated Carbon Composite
- Use of Recycled Aggregate in Concrete
- A Study to Assess the Level of Stress and Coping Strategies Adopted By Executives of the Selected Establishments in Pune City
- A New Class of Contra Continuous Functions via b-Open Sets in SETS
Last modified: 2021-07-01 14:42:41