A survey on existing IP trace back mechanisms and their comparisons
-
2018-03-01 https://doi.org/10.14419/ijet.v7i1.9.9972 -
IP Trace Back, DDoS Traffic, IP Spoofing, Hybrid IP Trace Back. -
Abstract
Security is the one of the main point of focus in recent trends of computer science, as it has to determine the right people accessing the system and ones who are trying the bypassing it. IP spoofing is one of the prevalent attacks, where the attackers launch the attack by spoofing the source address, once this happens they can attack without revealing their exact location. The attacker uses a fraudulent IP address to conceal their identity. To reveal the attackers real locations many IP trace back mechanisms have been proposed but the attacker immediately gets away with the information. There is another problem which is to detect DDoS traffic and the precarious packets set up by the attacker, which are a threat to the victim as well as the whole network, here lies another hurdle which is to differentiate between the attacker’s data traffic from the normal data traffic. There are many solutions given for this but one among them is IP trace back which already has researched upon in the past and implemented then, but what is lacking in the solution such that the attacks are even now taking place. IP trace back if modified, strengthened would analyze the traffic faster and trace out the attacker with a faster pace, which is why a hybrid IP tracing and tracking mechanism if introduced could ease the current problem.
-
References
[1] Goodrich, Michael T., “Efficient packet marking for large-scale IP tracebackâ€, Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 117-126. ACM, 2002.https://doi.org/10.1145/586110.586128.
[2] Burch, Hal, and Bill Cheswick., “Tracing Anonymous Packets to Their Approximate Sourceâ€, LISA, pp. 319-327. 2000.
[3] Savage, Stefan, David Wetherall, Anna Karlin, and Tom Anderson., “Practical network support for IP tracebackâ€, ACM SIGCOMM Computer Communication Review, vol. 30, no. 4, pp. 295-306. ACM, 2000.https://doi.org/10.1145/347059.347560.
[4] Song, Dawn Xiaodong, and Adrian Perrig., “Advanced and authenticated marking schemes for IP tracebackâ€, Proceedings of IEEE Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM, vol. 2, pp. 878-886. 2001.
[5] Kuo, Wen-Chung, Yi-Lin Chen, Shuen-Chih Tsai, and Jung-Shian Li., “Single-packet ip traceback with less loggingâ€, Seventh IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 4 October, 2011 , pp. 97-100. https://doi.org/10.1109/IIHMSP.2011.89.
[6] Moreira, Marcelo DD, Rafael P. Laufer, Natalia C. Fernandes, and Otto Carlos MB Duarte, “A stateless traceback technique for identifying the origin of attacks from a single packetâ€, IEEE International Conference on Communications (ICC), 5 June, 2011, pp. 1-6.
[7] Tseng, Yu Kuo, Hsi Han Chen, and Wen Shyong Hsieh., “Probabilistic packet marking with non-preemptive compensationâ€, IEEE Communications Letters, vol. 8, no. 6, (2004), pp. 359-361.https://doi.org/10.1109/LCOMM.2004.831336.
[8] Parashar, Ashwani, and Ramaswami Radhakrishnan., “A review of packet marking ip traceback schemesâ€, International Journal of Computer Applications, vol. 67, no. 6, (2013).https://doi.org/10.5120/11398-6704.
[9] Park, Kihong, and Heejo Lee., “On the effectiveness of probabilistic packet marking for IP traceback under denial of service attackâ€, Proceedings of Twentieth IEEE Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2001, vol. 1, pp. 338-347.
[10] Bellovin, Steven Michael, Marcus Leech, and Tom Taylor, “ICMP traceback messagesâ€, 2003.
-
Downloads
-
How to Cite
Shariff, V., Ramya K, R., Renuka Devi, B., Bhattacharyya, D., & Kim, T.- hoon. (2018). A survey on existing IP trace back mechanisms and their comparisons. International Journal of Engineering & Technology, 7(1.9), 67-71. https://doi.org/10.14419/ijet.v7i1.9.9972Received date: 2018-03-08
Accepted date: 2018-03-08
Published date: 2018-03-01