A survey on existing IP trace back mechanisms and their comparisons

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Security is the one of the main point of focus in recent trends of computer science, as it has to determine the right people accessing the system and ones who are trying the bypassing it. IP spoofing is one of the prevalent attacks, where the attackers launch the attack by spoofing the source address, once this happens they can attack without revealing their exact location. The attacker uses a fraudulent IP address to conceal their identity. To reveal the attackers real locations many IP trace back mechanisms have been proposed but the attacker immediately gets away with the information. There is another problem which is to detect DDoS traffic and the precarious packets set up by the attacker, which are a threat to the victim as well as the whole network, here lies another hurdle which is to differentiate between the attacker’s data traffic from the normal data traffic. There are many solutions given for this but one among them is IP trace back which already has researched upon in the past and implemented then, but what is lacking in the solution such that the attacks are even now taking place. IP trace back if modified, strengthened would analyze the traffic faster and trace out the attacker with a faster pace, which is why a hybrid IP tracing and tracking mechanism if introduced could ease the current problem.


  • Keywords


    IP Trace Back; DDoS Traffic; IP Spoofing; Hybrid IP Trace Back.

  • References


      [1] Goodrich, Michael T., “Efficient packet marking for large-scale IP traceback”, Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 117-126. ACM, 2002.https://doi.org/10.1145/586110.586128.

      [2] Burch, Hal, and Bill Cheswick., “Tracing Anonymous Packets to Their Approximate Source”, LISA, pp. 319-327. 2000.

      [3] Savage, Stefan, David Wetherall, Anna Karlin, and Tom Anderson., “Practical network support for IP traceback”, ACM SIGCOMM Computer Communication Review, vol. 30, no. 4, pp. 295-306. ACM, 2000.https://doi.org/10.1145/347059.347560.

      [4] Song, Dawn Xiaodong, and Adrian Perrig., “Advanced and authenticated marking schemes for IP traceback”, Proceedings of IEEE Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM, vol. 2, pp. 878-886. 2001.

      [5] Kuo, Wen-Chung, Yi-Lin Chen, Shuen-Chih Tsai, and Jung-Shian Li., “Single-packet ip traceback with less logging”, Seventh IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 4 October, 2011 , pp. 97-100. https://doi.org/10.1109/IIHMSP.2011.89.

      [6] Moreira, Marcelo DD, Rafael P. Laufer, Natalia C. Fernandes, and Otto Carlos MB Duarte, “A stateless traceback technique for identifying the origin of attacks from a single packet”, IEEE International Conference on Communications (ICC), 5 June, 2011, pp. 1-6.

      [7] Tseng, Yu Kuo, Hsi Han Chen, and Wen Shyong Hsieh., “Probabilistic packet marking with non-preemptive compensation”, IEEE Communications Letters, vol. 8, no. 6, (2004), pp. 359-361.https://doi.org/10.1109/LCOMM.2004.831336.

      [8] Parashar, Ashwani, and Ramaswami Radhakrishnan., “A review of packet marking ip traceback schemes”, International Journal of Computer Applications, vol. 67, no. 6, (2013).https://doi.org/10.5120/11398-6704.

      [9] Park, Kihong, and Heejo Lee., “On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack”, Proceedings of Twentieth IEEE Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2001, vol. 1, pp. 338-347.

      [10] Bellovin, Steven Michael, Marcus Leech, and Tom Taylor, “ICMP traceback messages”, 2003.


 

View

Download

Article ID: 9972
 
DOI: 10.14419/ijet.v7i1.9.9972




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.