CFP last date
20 January 2025
Reseach Article

Analysis of Various IP Traceback Techniques - A Survey

by K. Arun Kumar, K. Sai Ashritha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 77 - Number 13
Year of Publication: 2013
Authors: K. Arun Kumar, K. Sai Ashritha
10.5120/13542-1172

K. Arun Kumar, K. Sai Ashritha . Analysis of Various IP Traceback Techniques - A Survey. International Journal of Computer Applications. 77, 13 ( September 2013), 13-16. DOI=10.5120/13542-1172

@article{ 10.5120/13542-1172,
author = { K. Arun Kumar, K. Sai Ashritha },
title = { Analysis of Various IP Traceback Techniques - A Survey },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 77 },
number = { 13 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 13-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume77/number13/13542-1172/ },
doi = { 10.5120/13542-1172 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:50:08.959944+05:30
%A K. Arun Kumar
%A K. Sai Ashritha
%T Analysis of Various IP Traceback Techniques - A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 77
%N 13
%P 13-16
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

IP traceback could also be a name given to any methodology for reliably determining the origin of a packet on the net. Because of trusting nature of the IP protocol, the source IP address of a packet is not authenticated. As a result, the source address in an IP packet can be fake allowing for Denial Of Service attacks (DoS) or one-way attacks. IP Traceback may be a important ability for chararcteristics sources of attacks and Starting protection measures for the Internet. This study paper extends many technologies to prevent the secured information from the network issues by using different IP traceback techniques.

References
  1. A. Yaar, A. Perrig, and D. Song, "FIT: Fast internet traceback," in Proc. IEEE INFOCOM2005, Miami, FL, Mar. 2005, pp. 1395–1406.
  2. Shui Yu, Wanlei Zhou, Robin Doss and Weijia Jia, "Traceback of DDoS Attacks UsingEntropy Variations" in proc IEEE transactions on parallel and distributed systems, vol. 22, no. 3, march 2011.
  3. M. D. D. Moreira, R. P. Laufer, N. C. Fernandes and O. C. M. B. Duarte, "A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet,", ICC 2011, pp. 1-6, June 2011.
  4. Qiao Yan and Xiaoming He and Tuwen Ning," An Improved Dynamic Probabilistic Packet Marking for IP Traceback", I. J. Computer Network and Information Security, 2010, 2, 47-53.
  5. X. Liu, X. Yang, and Y. Xia, "NetFence: Preventing Internet Denial of Service from Inside Out," in ACM SIGCOMM. ACM, 2010.
  6. K. H. Choi and H. K. Dai, "A marking scheme using Huffman codes for IP traceback," in Proc. 7th Int. Symp. Parallel Architectures, Algorithms Networks (SPAN'04), Hong Kong, China, May 2004, pp. 421–428.
  7. C. Gong and K. Sarac, "A more practical approach for single-packet IP traceback using packet logging and marking," IEEE Trans. Parallel Distributed Syst. , vol. 19, no. 10, pp. 1310–1324, Oct. 2008.
  8. S. Malliga and A. Tamilarasi, "A proposal for new marking scheme with its performance evaluation for IP traceback,"WSEAS Trans. Computer Res. , vol. 3, no. 4, pp. 259–272, Apr. 2008.
  9. L. Zhang and Y. Guan, "TOPO: A topology-aware single packet attack traceback scheme," in Proc. IEEE In. Conf. Security Privacy Communication Networks (SecureComm 2006), Baltimore, MD, Aug. 2006, pp. 1–10.
  10. A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, B. Schwartz, S. T. Kent, and W. T. Strayer, "Single-packet IP trace back," IEEE/ACM Trans. Networking, vol. 10, no. 6, pp. 721–734, Dec. 2002.
  11. S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical network support for IP traceback," in Proc. ACM SIGCOMM2000, Stockholm, Sweden, Aug. 2000, pp. 295–306.
  12. K. Sarac and C. Gong, "Toward a practical packet marking approach for IP traceback," Int. J. Network Security, vol. 8, no. 3, pp. 271–281, Mar. 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Denial of service (DOS) packet marking and packet logging.