ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

IP Trace Back Scheme for Packet Marking and Packet Logging Using RIHT?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 4)

Publication Date:

Authors : ;

Page : 429-432

Keywords : DoS attack; DDoS attack; hybrid IP trace back; IP spoofing; packet logging; packet marking;

Source : Downloadexternal Find it from : Google Scholarexternal


Internet Protocol trace back is the enabling technology to control the crime. Internet Protocol packet is to find the real source of Internet attacks, we must possess the capability of discovering the origin of IP packets without relying on the source IP address field. This capability is called IP trace back. IP trace back systems provide a means to identify true sources of IP packets without relying on the source IP address field of the packet header, and are the major technique to find the real attack sources. In this project we present an IP trace back system called Deterministic Packet Marking and with packet logging which provides [1] a defense system with the ability to find out the real sources of attacking packets that traverse through the network. While a number of other trace back schemes exist, we propose a new hybrid IP trace back scheme with efficient packet logging aiming to have a fixed storage requirement for each router in packet logging without the need to refresh the logged tracking information and to achieve zero false positive and false negative rates in attack-path reconstruction.

Last modified: 2013-05-02 16:51:20