ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Analysis of Different IP Traceback Techniques

Journal: GRD Journal for Engineering (Vol.1, No. 8)

Publication Date:

Authors : ; ;

Page : 19-25

Keywords : DDoS attack; Types of DDoS attack; IP Traceback techniques; link testing; PPM; DPM;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Internet usage is increasing day by day as well as the attacks on the sites. Distributed denial of service (DDoS) is one of the such type of attacks. DDoS disable the server by flooding invalid requests with invalid or spoofed addresses, due to this the server's buffer gets overloaded and bandwidth of server get exhausted and server stop its services. Left undetected, can be very dangerous to the entire network. If organizations can detect these types of attack in advance then organizations will be saved from loss of these attacks, there is much prevention techniques which can detect these types of attack but while choosing one of these technique questions arise which technique should be used? Which is the best? IP Traceback technique is a DDoS detection technique, which is used to trace the path of an IP packet to its origin so one can find out the true identity of the attacker and can detect the path characteristics. Different types of IP Traceback Techniques are available. In this paper we study different IP Traceback techniques. citation: Aman Sachdeva, World College of Technology & Management, Gurgaon, India; Mr. Binayak Parashar ,World College of Technology & Management, Gurgaon. "Analysis of Different IP Traceback Techniques." Global Research and Development Journal For Engineering 18 2016: 19 - 25.

Last modified: 2016-11-11 16:18:03