CFP last date
20 December 2024
Reseach Article

A New Hybrid IP Traceback Scheme

by P. D. Kadam, B. M. Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 50
Year of Publication: 2018
Authors: P. D. Kadam, B. M. Patil
10.5120/ijca2018917321

P. D. Kadam, B. M. Patil . A New Hybrid IP Traceback Scheme. International Journal of Computer Applications. 180, 50 ( Jun 2018), 30-33. DOI=10.5120/ijca2018917321

@article{ 10.5120/ijca2018917321,
author = { P. D. Kadam, B. M. Patil },
title = { A New Hybrid IP Traceback Scheme },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2018 },
volume = { 180 },
number = { 50 },
month = { Jun },
year = { 2018 },
issn = { 0975-8887 },
pages = { 30-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number50/29579-2018917321/ },
doi = { 10.5120/ijca2018917321 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:04:08.484587+05:30
%A P. D. Kadam
%A B. M. Patil
%T A New Hybrid IP Traceback Scheme
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 50
%P 30-33
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now days the Internet is exposed to a span of web threats, So the attack on its infrastructure poses a great challenge in its expansion. In the modern world various types of attacks are discovered on the Internet. IP spoofing is one of the major threats in the network security. Hackers use this to hide their identity or to perform an attack. IP spoofing used for many attacks like denial of service, SYN flooding and man in the middle attacks etc. It is necessary to capture or block the spoofers to defend against these attacks. Different IP trace back mechanisms are used for finding the spoofers identity. IP trace back scheme is a way used to catch the real path of web packets requiring a longer search so, a new hybrid IP trace back scheme is used with efficient packet logging aiming to have a fixed storage requirement for each router in packet logging without the need to refresh the logged tracking information and to achieve zero false positive and false negative rates in attack-path reconstruction. The hybrid IP trace back scheme compare with other related research in the aspects of storage requirement, computation, and accuracy.

References
  1. A. Hussain, J. Heidemann, and C. Papadopoulos, “A Frame-work for Classifying Denial of Service Attacks,” Proc. ACM SIGCOMM ’03,Aug. 2003
  2. B.Al-Duwariand M.Govindarasu,“Novel hybrid schemes employing packet marking and logging for IP traceback,” IEEE Trans. Parallel Distributed Syst. , vol. 17, no. 5, pp. 403–418, May 2006.
  3. A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchak-ountio, B. Schwartz, S. T. Kent, and W. T. Strayer, “Single-packet IP traceback,” IEEE/ACM Trans. Networking, vol. 10, no. 6, pp. 721–734, Dec. 2002. traceback,” Proceedings of ACM SIGCOMM 2001, pp.3–14, 2001.
  4. C. Gong and K. Sarac, “A more practical approach for single-packet IP traceback using packet logging and marking,” IEEE Trans. Parallel Distributed Syst. , vol. 19, no. 10, pp. 1310–1324, Oct. 2008.
  5. Glenn Carl and George Kesidis, Richard R. Brooks and Suresh Rai.” Denial-of-Service Attack - Detection Techniques”, IEEE Internet Computing, pp: 82-89, January • February 2006
  6. Shui Yu, Wanlei Zhou, Robin Doss and Weijia Jia, “Traceback of DDoS Attacks UsingEntropy Variations” in proc IEEE transactions on parallel and distributed systems, vol. 22, no. 3, march 2011.
  7. A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, B. Schwartz, S. T. Kent, and W. T. Strayer,“Single- packet IP traceback,” IEEE/ACM Trans. Networking, vol. 10, no. 6, pp. 721–734, Dec. 2002.
  8. L. Zhang and Y. Guan, “TOPO: A topology-aware single packet attack traceback scheme,” in Proc. IEEE In. Conf. Security Privacy Communication Networks (SecureComm 2006), Baltimore, MD, Aug. 2006, pp. 1–10.
  9. C. Gong and K. Sarac, “A more practical approach for single-packet IP traceback using packet logging and marking,” IEEE Trans. Parallel Distributed Syst., vol. 19, no. 10, pp.1310–1324, Oct. 2008.
  10. S. Malliga and A. Tamilarasi, “A proposal for new marking scheme with its performance evaluation for IP traceback,”WSEAS Trans. Computer Res., vol. 3, no. 4, pp. 259–272, Apr. 2008.
  11. S. Malliga and A. Tamilarasi, “A hybrid scheme using packet marking and logging for IP traceback,” Int. J. Internet Protocol Technol., vol. 5, no. 1/2, pp. 81–91, Apr.2010.
  12. K. H. Choi and H. K. Dai, “A marking scheme using Huffman codes for IP traceback,” in Proc.7th Int. Symp. Parallel Architectures, Algorithms Networks (SPAN’04), Hong Kong, China, May 2004, pp.421–428.
  13. T. Korkmaz, C. Gong, K. Sarac, and S. G. Dykes, “Single packet IP traceback in AS-level partial deployment scenario,” Int. J. Security Networks, vol. 2, no. 1/2, pp. 95–108, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

New hybrid IP trace back CAIDA’s distributed denial of service attack packet logging packet marking.