An efficient token based authentication mechanism for IP trace back
-
2018-06-08 https://doi.org/10.14419/ijet.v7i2.33.15530 -
IP Trace Back, Forensic Analysis, Token, Trace Back Server -
Abstract
IP traceback plays an important role in the cyber investigation process. Because of the trusting nature of protocol the source IP address is not authenticated. So there may be the chances of occurring one way attack is very high. As a result the receiver does not accept the data properly. It is known as IP traceback problem. So the IP traceback traces the source of packets and also the traversed path of these packets. Some applications of the IP traceback are network diagnosis, path validation, performance testing and forensic analysis and so on. Objective of the paper is to prevent unauthorised users requesting from traceback information for malicious operations. So developed a token based packet marking mechanism .It uses token for identifying the sources. In token based authentication IP traceback it uses a token passing mechanism. The traceback server generates the token. The data along with token is send to the end host. Only the actual data arrives at end host. The cloud based sever stores the token, data, node details and transmission details. If an attack occurs the token can be used for identifying the sources as well as traversed path of packet.
Â
-
References
[1] H. Aljifri, “IP traceback: a new denial-of-service deterrent?†IEEE Security and Privacy, vol. 1, no. 3, pp. 24–31, 2003.
[2] L. Lu, M. C. Chan, and E.-C. Chang, “A general model of probabilistic packet marking for ip traceback,†in ASIACCS ’08, 2008, pp. 179–188.
[3] Luis A. Sanchez,2 Walter C. Milliken, Alex C. Snoeren , “Hardware Support for a Hash-Based IP Traceback,†in IEEE DARPA Information survivability conference , pp. 179–188,2001
[4] B. Al-Duwairi and M. Govindarasu, “Novel hybrid schemes employing packet marking and logging for IP traceback,†IEEE Trans. Parallel Distrib. Syst., vol. 17, no. 5, pp. 403–418, 2006.
[5] Y. Xiang, W. Zhou, and M. Guo, “Flexible deterministic packet marking: An IP traceback system to find the real source of attacks,†IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 4, pp. 567–580, 2009.
[6] Belenky and N. Ansari, “On deterministic packet marking,†Computer Networks, vol. 51, no. 10, pp. 2677–2700, 2007.
[7] V. Aghaei-Foroushani and A. Zincir-Heywood, “IP traceback through (authenticated) deterministic flow marking: an empirical evaluation,†EURASIP Journal on Info. Security, 2013.
[8] W. Xia, Y. Wen, C. H. Foh, D. Niyato, and H. Xie, “A survey on software-defined networking,†IEEE Communications Surveys Tutorials, vol. 17, no. 1, pp. 27–51, 2015.
[9] Y. Lu, B. Prabhakar, and F. Bonomi, “Perfect Hashing for Network Applications,†in 2006 IEEE International Symposium on Information Theory, July 2006, pp. 2774–2778
[10] A.-R. Sadeghi, T. Schneider, and M. Winandy, “Token-based cloud computing: Secure outsourcing of data and arbitrary computations with lower latency,†in TRUST’10, 2010, pp. 417–429.
-
Downloads
-
How to Cite
S. MTech Scholar, D., & P.S, A. (2018). An efficient token based authentication mechanism for IP trace back. International Journal of Engineering & Technology, 7(2.33), 912-914. https://doi.org/10.14419/ijet.v7i2.33.15530Received date: 2018-07-13
Accepted date: 2018-07-13
Published date: 2018-06-08