SlideShare a Scribd company logo
Journal for Research| Volume 02 | Issue 02 | April 2016
ISSN: 2395-7549
All rights reserved by www.journalforresearch.org 42
Comparative Study of IP Trace back Techniques
Jigneshkumar V Madhad Piyush Patel
Department of Computer Engineering Department of Computer Engineering
Narnarayan Shastri Institute of Technology, Jetalpur, Narnarayan Shastri Institute of Technology, Jetalpur,
Ahmedabad, GTU-Gujarat, India Ahmedabad, GTU-Gujarat, India
Abstract
because so many decades World Wide Web has been used broadly in numerous fields, network safety problems include the main
matter. IP traceback is just the actual method to understand the actual purpose, it reconstructs IP packets traversed path inside the
World Wide Web to determine their own roots. IP Traceback may be an important ability for characteristics sources of attacks
and Starting protection measures for the Internet. This paper discovers different IP Traceback approaches. This comparative
paper provides as well as extends many technologies to prevent the secured information from the network issues by using
different IP traceback techniques.
Keywords: IP Traceback, Link testing, Packet Marking, ICMP Traceback
_______________________________________________________________________________________________________
I. INTRODUCTION
Internet facilities are generally as well as widely used now-a-days to finish and do each and every task or activity. As Internet is
utilized for several tasks, attackers find a method to interrupt the services provided by it. For this reason, right now network
safety may be a necessary requirement of Internet World. Even though many security measures are adapted by the security
people to ensure security for the customers, still Internet is open for many attacks. The attacks have become so prevalent that no
security measure can prevent all of them.
So as to fortify the matter of organizations, they require systems, for example, IP Traceback procedures which will at last
decrease the possibilities of misfortunes. IP Traceback is an endeavour to follow the genuine beginning of a packet or a stream of
packets. As a result of IP Spoofing, just accepting that the packet was sent by the node indicated as the source address in its IP
header is not generally compelling, so different strategies for following packets to their root are required. Thus effective IP
Traceback methods must be utilized to discover the genuine source of attacks, with a specific end goal to take any preventive or
legitimate activities against the attackers.
IP Traceback is used to find the origins and attacking paths of malicious traffic. The task of identifying the original source of a
packet is complex as the source IP address can be fake or spoofed. So IP Traceback techniques neither prevent nor stop the
attack, they are used only to identify the source of the packets.
II. EXISTING IP TRACEBACK TECHNIQUES
Existing IP Traceback approaches can be classified into five main categories: [1]
- Link Testing
- Packet marking
- ICMP Traceback
- Logging
- Hybrid tracing.
Link Testing [2,3]
:
Link testing is an approach which determines the upstream of attacking traffic hop-by-hop while the attack is in progress. The
majority of active traceback strategies begin as the router best for the target and interactively test their upstream hyperlinks till
they will decide which one is used to carry the attacker's traffic. In a perfect world, this method is rehashed recursively on the
upstream router until the source is reached. Below we summarize two varieties of link testing schemes:
Input Debugging:
Numerous routers incorporate a component called input debugging. In Input Debugging, the victim needs to perceive that it is
being attacked and needs to build up an attack signature that describes a common feature contained in all the attack packets. The
most emergent problem with the input debugging approach, even with automated tools, is the management overhead, the co-
ordination from the network admin. If the admin is unavailable or if he lacks the skill to assist the traceback, then the traceback
process may be sluggish or its completion could be unattainable.
Controlled Flooding:
Another link testing traceback technique called Control Flooding which does not require any support from network operators.
This technique tests incoming links of the victim by iteratively flooding each link with large bursts of traffic to see its effect on
the incoming traffic. By observing the change in the rate of packets received, the victim can infer from which link the attack
Comparative Study of IP Trace back Techniques
(J4R/ Volume 02 / Issue 02 / 007)
All rights reserved by www.journalforresearch.org 43
packets have arrived. This procedure is applied to the next upstream router until the origin of attack is reached. This kind of
traceback by itself floods the network. Controlled flooding is also poorly suited for tracing distributed denial-of-service attacks
because the link-testing mechanism is inherently noisy and it can be difficult to discern the set of paths being exploited when
multiple upstream links are contributing to the attack. Finally, like all link-testing schemes, controlled flooding is only effective
at tracing an on-going attack and cannot be used “post-mortem”.
Packet Marking
Packet marking methods relies on the routers in the network to send their identities to the destinations either by encoding this
information directly in rarely used bits of the IP Header, or by generating new packet to the same destination. They have the
drawback in that they require large number of attack packets to be collected by the victim to infer the attack paths. [5]
Packet marking methods require routers modify the header of the packet to contain the information of the router and
forwarding decision. Hence the receiver of the packet can then reconstruct the path of a packet (or an attacking flow) from the
received packets. [1]
As Packet marking methods do not cost storage resource on routers and the link bandwidth resource, they are generally
considered to be lightweight. Because however, packet marking is not a widely supported function on routers; thus, it is difficult
to enable packet marking traceback in the network.
There are two approaches of packet marking schemes:
- Probabilistic Packet Marking
- Deterministic Packet Marking
Probabilistic Packet Marking [3]
Probabilistic packet marking makes use of the Identification field as the marking space and stores the link information. It divides
the IP address into eight fragments, 4 bits for each. This IP address fragment and the same offset fragment of the next router
compose the edge fragment with 8 bits. The offset flag needs 3 bits for eight fragments, and the last 5 bits are enough to show the
hop number. It is reported that few packets exceed 25 hops in the forwarding network [9]
. When a router decides to mark a
packet, it chooses a random fragment of its IP address, and records the fragment offset with the distance field set to 0. The
advantage of PPM is that it needs no storage overhead for each router. But the drawbacks are also apparent. Victim needs a large
number of packets to reconstruct the attack path, and PPM does not have the ability to trace a single packet.
Fig. 1: Probabilistic Packet Marking Method
Probabilistic Packet Marking Method [2,9]
is shown in Fig. 1. In this techniques, each router marks the packet with some
probability say p for example p = 1/100 which implies marking one packet for every 100 packets received. The marking field
uses 16 bits identification field in the header, of which 5 bits are used for marking hop count, which would be a useful
information during reconstruction of attack path, and the remaining bits are used by the router to send its information.
Larger information can be broken into fragments and marked in multiple packets. The marked packets will therefore contain only
partial information of the path. This reduces the storage overhead in the packets. The victim has to receive enough number of
packets to re-construct the path. Prior knowledge of the topology does not require in this scheme. The disadvantage of this
scheme is that it produces many false positives and the mark field value written by routers far away from victim might be
overwritten by the routers closer to the victim and if the attacker is aware of the scheme, then the traceback fails. The marking
field is used to hold start, end and distance. The start and end fields store the IP addresses of the routers residing at the two end
points making an edge and the distance field registers the number of hops between this edge marked and the victim.
Comparative Study of IP Trace back Techniques
(J4R/ Volume 02 / Issue 02 / 007)
All rights reserved by www.journalforresearch.org 44
Deterministic Packet Marking [3]
Fig. 2: Deterministic Packet Marking Method
Deterministic Packet Marking scheme (DPM) is shown in Fig. 2. This technique overcomes the disadvantages of PPM. Every
packet passing through the first ingress edge router is only marked with the IP address of the router. The IP address is divided
into two fragments (16 bits each) and each fragment is randomly recorded into each inflowing packet. The entire IP address is
recovered by the victim when the victim obtains both the fragments of the same ingress router. This scheme fails when the
source address is spoofed and is also false positive. The enhanced schemes [7,8]
are proposed where the IP address is split into
more fragments, and a hash function is used to contain the identity of the ingress router to decrease the false positive.
Deterministic packet marking based on redundant decomposition is proposed in [10]
. The knowledge of topology plays a
significant role in DPM scheme’s traceback. Consider the DPM scheme suggested in [11]
where, it is assumed that the topology of
the network is known in advance. The packet marking method involves hash of ingress router’s IP address. The hash value is
split into chunks and each chunk is marked into the packet randomly. With the topology known, the victim performs traceback of
the marked routers. Large numbers of packets are not required for traceback in this scheme but it consumes a longer search time
to identify the origin. The traceback scheme is challenged, if the topology is modified.
When an intermediate router goes off, the traceback can be carried out with the topology but might turn to be false positive. If
the attacker modifies the mark field, this scheme will fail to traceback. Instead of IP address respective bit fields were marked in
[12]
. In Flexible Deterministic Packet Marking (FDPM) scheme [13, 14]
, the marking field length is varied according to the
requirement. The length of the marking field is flexible and can be adjusted. Further, the marking rate can also be adaptively
changed according to the incoming traffic load on the participating router. FDPM is capable of tracing a large number of real
sources with low false positive rate and low resource requirement on routers.
ICMP Traceback[3]
Internet Control Message Protocol (ICMP) in would like of trace out full path of the attacks. Typically this scheme is for each
router to come upwith an ICMP traceback message or reach directed to the identical destination because the elite packet. The
trace message itself consists of consequent and previous hop data and a time stamp.
Fig. 3: ICMP Traceback
A traceback scheme utilizing the explicitly generated ICMP Traceback message was proposed in [15]
. Each router samples the
forwarding packets with a low probability (e.g. 1/20000) and sends a special ICMP message including the information like
neighboring routers (forward and backward links) on the path to the destination and source along with the original (triggering)
Comparative Study of IP Trace back Techniques
(J4R/ Volume 02 / Issue 02 / 007)
All rights reserved by www.journalforresearch.org 45
packet. Traceback packet also includes an authentication field which guards against spoofed traceback packets sent from
attackers. This field can be null authentication, random strings or even HMACs. TTL is set to 255 for computing distance at the
receiving end. During DDoS flooding attack, these ICMP traceback messages are used by the victim to reconstruct the path taken
by the attacker. The schematic representation of the scheme is shown in Figure 5. The updated version of the previous iTrace
(ICMP Traceback) scheme was proposed in [16]
. iTrace scheme is considered as an industry standard by IETF. The time taken for
path reconstruction by iTrace is minimized in ICMP Traceback with cumulative path (iTrace CP) [17]
. This scheme is
independent of the attack length. This scheme encodes the entire attack path information (i.e. contains the addresses of all the
routers on the attack path) into minimal number of packets, thus minimizing the attack path construction time. This is achieved at
the expense of minimal additional overhead in computation, storage and bandwidth. An enhancement to this scheme is suggested
in Enhanced ICMP Traceback with Cumulative Path [18]
, which suggests the exponential increase in the probability of message
generation with the distance in hops from the victim. The effectiveness of the scheme relies on selecting the appropriate value for
the probability exponent which influences the traceback time for attack paths of different length. The iTrace scheme suffers a
serious problem on the resource spent on generating the number of traceback packets which turns out to be neither useful nor
informative during traceback and this issue is addressed in Intention-driven ICMP traceback [19]
which enhances the probability
of the router to generate useful trace messages. This is achieved by adding an additional intention bit to the iTrace message. A
modification to Intention driven traceback is provided in [20]
to create more effective iTrace packets to detect the origin of attack
more accurately.
Logging [3]
This solution involves storing packet digests or signatures at intermediate routers. The drawbacks of this technique include
significant amount of resources have to be reserved at intermediate routers and hence large overhead on the network, complexity,
centralized management.
Fig. 4: Logging Packet
Logging is suggested to log packets at key routers and so use data-mining techniques to see the trail that the packets traversed.
It has the valuable property that it will trace an attack long once the attack has completed. This system has drawbacks, and
probably huge resource needs and large scale interprovider information integration tough.
Logging scheme for IP traceback stores the information like packet’s digest, signature, and fields of IP header on all or few
routers which forward packets within the domain. It is shown in Figure 6. When an attack is detected, the victim requests the
upstream router to gather information about attack packet. If the information is found, then the router is counted as a hop in the
attack path and the process is repeated.
Hybrid Traceback [3]
This solution achieves the best of both the worlds: small number of attack packets to conduct the traceback process and small
number of resources to be allocated at intermediate routers for packet logging purposes.
The idea of hybrid scheme combining marking and logging has been conceived to overcome the disadvantage of individual
marking and logging schemes as stated above and a drastic improvement in traceback has been achieved. In [21]
, two hybrid
schemes of IP traceback are proposed – Distributed Linked List Traceback (DLLT) and Probabilistic Pipeline Packet Marking
(PPPM). The first scheme preserves the marking information at the core routers in a precise way such that it can be collected
using a linked-list based approach. The second scheme aims at passing the IP addresses of the routers that were involved in
marking particular packets by stuffing them into the packets going to the same destination. This mechanism avoids the need for
long-term storage at the core routers. This scheme can fail if IP marking field value is spoofed by the adversary but can be
Comparative Study of IP Trace back Techniques
(J4R/ Volume 02 / Issue 02 / 007)
All rights reserved by www.journalforresearch.org 46
identified with the help of restrictions imposed on TTL field. When compared to IP logging schemes, processing and storage
overhead at the routers are significantly minimized using this Hybrid Scheme.
III. PASSIVE IP TRACEBACK
Here natural Internet-scale Passive IP traceback (PIT) approach that requires no ISP deployment. PIT analyzes packets collected
from network telescopes, and infers the locations of spoofed traffic. The intuition behind PIT is that spoofing flows may trigger
ICMP error messages at routers on the path to victim. These ICMP messages are sent to the spoofed nodes. Under the
assumption that attackers use randomly forged addresses, some of these ICMP messages will be received by the network
telescopes. The addresses of routers sending the message can be combined with an Internet route model to re-construct the attack
path and find the locations of the spoofers.
Fig. 5: Passive IP traceback
IV. COMPARISON OF VARIOUS IP TRACEBACK TECHNIQUES
Table – 1
Various IP Traceback Techniques [3]
Link
Testing
Packet Marking
Packet Logging ICMP
Traceback
Hybrid
PPM DPM
Deployability Fair Fair Fair
Poor. Huge
memory
requiremet
Good
Fair
Scalability
Poor Poor
Fair Fair
Good
Fair
Memory
Requirement
(Network)
Not
Required
Not
Required
Not
Required
Very High Not
Required
Low
Memory
Requirement
(Victim)
Not
Required
Very High Medium Not
Required
Medium Not
Required
Router
Processing
overhead
High Medium Medium High Low Low
Reliability
Good Good Good
Poor
Good and
Practically
feasible
Poor
Parameter
needed for
traceback
Attack
pattern
and large
number
of
packets
Large No.
of packet
Minimum
number of
packets
compared
to PPM
One
Packet
No.of
ICMP
messages
and huge
number of
attack
packets.
One
Packet
Applicability on
different types of
attacks
DoS
DoS/ DDoS
flooding attacks
DoS/DDoSflooding
attacks
DoS/DDoS
flooding attacks
DoS/DDoS
network layer
attacks
DoS/
DDoS flooding
attacks
Prior knowledge
of different
topology
Needed
Not needed.
Faster traceback
and low false
positive if known
Not needed. Faster
traceback and low false
positive if known
Not Needed Not Needed Not Needed
Accuracy Medium
Medium, huge
false positive rate
in case of DDoS
attack
Good
Medium with
high false
positive and false
negative
Good for less
number of
attackers
High. less false
positive and
false negative
rate.
Comparative Study of IP Trace back Techniques
(J4R/ Volume 02 / Issue 02 / 007)
All rights reserved by www.journalforresearch.org 47
Post Attack
Analysis
Not
Possible
Possible Possible Possible Possible Possible
Attacker
challenge vs.
Scheme’s
survival
Poor Poor Poor Poor Poor Poor
Router
Involvement
during Traceback
High Nil Nil High Nil High
V. CONCLUSION
The comparing traceback mechanism by considering different categories like Deployability, Router Involvement during
Traceback, Parameter needed for traceback, Router Processing overhead, Memory Requirement (Network), Memory
Requirement(Victim), Reliability. the advantages and disadvantages of the all mechanisms are described.
REFERENCES
[1] Guang Yao; Jun Bi; Vasilakos, A.V., "Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter," in Information Forensics and
Security, IEEE Transactions on , vol.10, no.3, pp.471-484, March 2015 doi: 10.1109/TIFS.2014.2381873
[2] S. Savage, D. Wetherall, A. Karlin, and T. Anderson, “Practical network support for ip traceback,” in Proceedings of the Conference on Applications,
Technologies, Architectures, and Protocols for Computer Communication, ser. SIGCOMM ’00. New York, NY, USA: ACM, 2000, pp. 295–306.
[3] Vijayalakshmi Murugesan, Mercy Shalinie, and Nithya Neethimani, “A Brief Survey of IP Traceback Methodologies”, Department of Computer Science
and Engineering, Thigarajar College of Engineering, Thiruparankundram, Madurai – 625015, Tamilnadu, India
[4] DONG YAN, YULONG WANG, SEN SU and FANGCHUN YANG A Precise and Practical IP Traceback Technique Based on Packet Marking and
Logging State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing, 100876 P.R. China
[5] B. Sai Priyanka, N. Srihari Rao, “IP Traceback Techniques – A Selective Survey” Department of Computer Science & Engineering, CMR Institute of
Technology, Hyderabad, A.P International Journal of Computer Science and Mobile Applications, Vol.1 Issue. 3, September- 2013, pg. 40-44 ISSN: 2321-
8363
[6] K. Arun Kumar, K. Sai Ashritha, “Analysis of Various IP Traceback Techniques - A Survey” Department of Computer Science & Engineering, CMR
Institute of Technology, Hyderabad, A.P International Journal of Computer Science and Mobile Applications (0975 – 8887), Volume 77– No.13,
September 2013ISSN: 2321-8363
[7] A. Belenky and N. Ansari, “Ip traceback with deterministic packet marking,” IEEE Communications Letters, vol. 7, no. 4, pp. 162–164, 2003.
[8] Belenky and N. Ansari: On Deterministic Packet Marking, Computer Networks, Vol. 51, No. 10, 2007, pp. 2677-2700
[9] S. Savage, D. Wetherall, A. R. Karlin, T. E. Anderson: Network Support for IP Traceback, IEEE/ACM Transactions on Networking, Vol. 9, No. 3, 2001,
pp. 226-237
[10] G. Jin and J. Yang: Deterministic Packet Marking Based on Redundant Decomposition for IP Traceback, IEEE Comm. Letters, Vol. 10, No. 3, 2006, pp.
204-206
[11] Wang Xiao-jing, Wang Xiao-yin: Topology Assisted Deterministic Packet Marking for IP Traceback, The Journal of China Universities of Posts and
Telecommunications, Vol. 17, No. 2, April 2010, pp. 116-121
[12] Y. Kim, J. Y. Jo, and F. L. Merat: Defeating Distributed Denial-of-Service Attack with Deterministic Bit Marking, Proc. IEEE Global Telecomm. Conf.
(GLOBECOM ’03), 2003, pp. 1363-1367
[13] Y. Xiang, W. Zhou, and J. Rough: Trace IP Packets by Flexible Deterministic Packet Marking (FDPM), Proc. IEEE Int’l Workshop IP Operations and
Management (IPOM ’04), 2004, pp. 246-252
[14] Y.Xiang, W.Zhou and M.Gu: Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks, IEEE Trans. Parallel
and Distributed System, Vol. 20, No. 4, April 2009, pp. 567- 580
[15] S. M. Bellovin: ICMP Traceback Messages, Internet Draft: draft-bellovin-itrace-00.txt, 2000
[16] S. M. Bellovin, M. D. Leech, and T. Taylor: ICMP Traceback Messages, Internet Draft: Draft-Ietf-Itrace-04.Txt, Feb. 2003
[17] Henry C. J. Lee, Vrizlynn L. L. Thing, Yi Xu, Miao Ma: ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback, International
Conference on Information and Communications Security, Oct. 2003
[18] V. L. L. Thing , H. C. J. Lee , M. Sloman and J. Zhou: Enhanced ICMP Traceback with Cumulative Path, 61st IEEE Veh. Technol. Conf., 2005
[19] Felix, W. (2001): On Design and Evaluation of Intention-Driven ICMP traceback, Proc. IEEE Int'l Conf. Computer Comm. and Networks, IEEE CS Press,
2001, pp. 159-165
[20] Izaddoost, M. Othman, and M. F. A. Rasid: Accurate ICMP Traceback Model under DoS/DDoS Attack, in Proceedings of the 15th International
Conference on Advanced Computing and Communications, 2007
[21] B.Al-Duwari and M. Govindarasu: Novel Hybrid Schemes Employing Packet Marking and Logging for IP Traceback, IEEE Trans. Parallel Distributed
Syst., Vol. 17, No. 5, May 2006, pp. 403-418

More Related Content

What's hot

REVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMP
REVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMPREVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMP
REVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMP
paperpublications3
 
Passive ip traceback disclosing the locations
Passive ip traceback disclosing the locationsPassive ip traceback disclosing the locations
Passive ip traceback disclosing the locations
jpstudcorner
 
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
ijsptm
 
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijripublishers Ijri
 
An improved ip traceback mechanism for network security
An improved ip traceback mechanism for network securityAn improved ip traceback mechanism for network security
An improved ip traceback mechanism for network security
eSAT Journals
 
Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backs...
Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backs...Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backs...
Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backs...
1crore projects
 

What's hot (20)

REVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMP
REVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMPREVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMP
REVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMP
 
Passive ip traceback disclosing the locations
Passive ip traceback disclosing the locationsPassive ip traceback disclosing the locations
Passive ip traceback disclosing the locations
 
PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...
PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...
PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...
 
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace BackIRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
 
Passive ip traceback disclosing the locations of ip spoofers from path backsc...
Passive ip traceback disclosing the locations of ip spoofers from path backsc...Passive ip traceback disclosing the locations of ip spoofers from path backsc...
Passive ip traceback disclosing the locations of ip spoofers from path backsc...
 
DDOS
DDOSDDOS
DDOS
 
Passive ip traceback disclosing the locations of ip spoofers from path backsc
Passive ip traceback disclosing the locations of ip spoofers from path backscPassive ip traceback disclosing the locations of ip spoofers from path backsc
Passive ip traceback disclosing the locations of ip spoofers from path backsc
 
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
 
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
 
Passive ip traceback disclosing the locations of ip spoofers from path backsc...
Passive ip traceback disclosing the locations of ip spoofers from path backsc...Passive ip traceback disclosing the locations of ip spoofers from path backsc...
Passive ip traceback disclosing the locations of ip spoofers from path backsc...
 
An improved ip traceback mechanism for network security
An improved ip traceback mechanism for network securityAn improved ip traceback mechanism for network security
An improved ip traceback mechanism for network security
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 
Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backs...
Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backs...Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backs...
Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backs...
 
Detection of ARP Spoofing
Detection of ARP SpoofingDetection of ARP Spoofing
Detection of ARP Spoofing
 
How to use packet sniffers
How to   use packet sniffersHow to   use packet sniffers
How to use packet sniffers
 
Firewalls (6)
Firewalls (6)Firewalls (6)
Firewalls (6)
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
Review on Grey- Hole Attack Detection and Prevention
Review on Grey- Hole Attack Detection and PreventionReview on Grey- Hole Attack Detection and Prevention
Review on Grey- Hole Attack Detection and Prevention
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
 

Viewers also liked

VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
Journal For Research
 

Viewers also liked (7)

Hydrology
HydrologyHydrology
Hydrology
 
Tiempos continuos
Tiempos continuosTiempos continuos
Tiempos continuos
 
ΑΟΘ-Κεφ.3-Πανελλαδικές εσπερινών
ΑΟΘ-Κεφ.3-Πανελλαδικές εσπερινώνΑΟΘ-Κεφ.3-Πανελλαδικές εσπερινών
ΑΟΘ-Κεφ.3-Πανελλαδικές εσπερινών
 
COLOUR LOCK SYSTEM FOR USER AUTHENTICATION
COLOUR LOCK SYSTEM FOR USER AUTHENTICATIONCOLOUR LOCK SYSTEM FOR USER AUTHENTICATION
COLOUR LOCK SYSTEM FOR USER AUTHENTICATION
 
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
 
3.16.17 findesemana,stem
3.16.17 findesemana,stem3.16.17 findesemana,stem
3.16.17 findesemana,stem
 
Animal Breeding
Animal BreedingAnimal Breeding
Animal Breeding
 

Similar to COMPARATIVE STUDY OF IP TRACEBACK TECHNIQUES

A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...
Mumbai Academisc
 
TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS
TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMSTRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS
TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS
IJNSA Journal
 

Similar to COMPARATIVE STUDY OF IP TRACEBACK TECHNIQUES (20)

A Survey On Opportunistic Piggyback Marking For IP Trace Back
A Survey On Opportunistic Piggyback Marking For IP Trace BackA Survey On Opportunistic Piggyback Marking For IP Trace Back
A Survey On Opportunistic Piggyback Marking For IP Trace Back
 
A Novel IP Traceback Scheme for Spoofing Attack
A Novel IP Traceback Scheme for Spoofing AttackA Novel IP Traceback Scheme for Spoofing Attack
A Novel IP Traceback Scheme for Spoofing Attack
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...
 
Ijnsa050211
Ijnsa050211Ijnsa050211
Ijnsa050211
 
TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS
TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMSTRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS
TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS
 
Single-packet hybrid IP traceback for IPv4 and IPv6 networks.
Single-packet hybrid IP traceback for IPv4 and IPv6 networks.Single-packet hybrid IP traceback for IPv4 and IPv6 networks.
Single-packet hybrid IP traceback for IPv4 and IPv6 networks.
 
An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...
 
6
66
6
 
A Survey on Cloud-Based IP Trace Back Framework
A Survey on Cloud-Based IP Trace Back FrameworkA Survey on Cloud-Based IP Trace Back Framework
A Survey on Cloud-Based IP Trace Back Framework
 
IRJET- Constructing Inter Domain Packet Filter for Controlling IP Spoofing
IRJET- Constructing Inter Domain Packet Filter for Controlling IP SpoofingIRJET- Constructing Inter Domain Packet Filter for Controlling IP Spoofing
IRJET- Constructing Inter Domain Packet Filter for Controlling IP Spoofing
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming Attack
 
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
 
Generating Router Level Topology Using Dns And Ip Identifier
Generating Router Level Topology Using Dns And Ip IdentifierGenerating Router Level Topology Using Dns And Ip Identifier
Generating Router Level Topology Using Dns And Ip Identifier
 
An Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet SniffingAn Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet Sniffing
 
A Survey on different Port Scanning Methods and the Tools used to perform the...
A Survey on different Port Scanning Methods and the Tools used to perform the...A Survey on different Port Scanning Methods and the Tools used to perform the...
A Survey on different Port Scanning Methods and the Tools used to perform the...
 
SIMULATION OF THE COMBINED METHOD
SIMULATION OF THE COMBINED METHODSIMULATION OF THE COMBINED METHOD
SIMULATION OF THE COMBINED METHOD
 
A REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESA REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURES
 
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
 
A Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing ProtocolsA Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing Protocols
 

More from Journal For Research

A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
Journal For Research
 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
Journal For Research
 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
Journal For Research
 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
Journal For Research
 

More from Journal For Research (20)

Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
 
Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...
 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
 
LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
 

Recently uploaded

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
Avinash Rai
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
parmarsneha2
 

Recently uploaded (20)

Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 

COMPARATIVE STUDY OF IP TRACEBACK TECHNIQUES

  • 1. Journal for Research| Volume 02 | Issue 02 | April 2016 ISSN: 2395-7549 All rights reserved by www.journalforresearch.org 42 Comparative Study of IP Trace back Techniques Jigneshkumar V Madhad Piyush Patel Department of Computer Engineering Department of Computer Engineering Narnarayan Shastri Institute of Technology, Jetalpur, Narnarayan Shastri Institute of Technology, Jetalpur, Ahmedabad, GTU-Gujarat, India Ahmedabad, GTU-Gujarat, India Abstract because so many decades World Wide Web has been used broadly in numerous fields, network safety problems include the main matter. IP traceback is just the actual method to understand the actual purpose, it reconstructs IP packets traversed path inside the World Wide Web to determine their own roots. IP Traceback may be an important ability for characteristics sources of attacks and Starting protection measures for the Internet. This paper discovers different IP Traceback approaches. This comparative paper provides as well as extends many technologies to prevent the secured information from the network issues by using different IP traceback techniques. Keywords: IP Traceback, Link testing, Packet Marking, ICMP Traceback _______________________________________________________________________________________________________ I. INTRODUCTION Internet facilities are generally as well as widely used now-a-days to finish and do each and every task or activity. As Internet is utilized for several tasks, attackers find a method to interrupt the services provided by it. For this reason, right now network safety may be a necessary requirement of Internet World. Even though many security measures are adapted by the security people to ensure security for the customers, still Internet is open for many attacks. The attacks have become so prevalent that no security measure can prevent all of them. So as to fortify the matter of organizations, they require systems, for example, IP Traceback procedures which will at last decrease the possibilities of misfortunes. IP Traceback is an endeavour to follow the genuine beginning of a packet or a stream of packets. As a result of IP Spoofing, just accepting that the packet was sent by the node indicated as the source address in its IP header is not generally compelling, so different strategies for following packets to their root are required. Thus effective IP Traceback methods must be utilized to discover the genuine source of attacks, with a specific end goal to take any preventive or legitimate activities against the attackers. IP Traceback is used to find the origins and attacking paths of malicious traffic. The task of identifying the original source of a packet is complex as the source IP address can be fake or spoofed. So IP Traceback techniques neither prevent nor stop the attack, they are used only to identify the source of the packets. II. EXISTING IP TRACEBACK TECHNIQUES Existing IP Traceback approaches can be classified into five main categories: [1] - Link Testing - Packet marking - ICMP Traceback - Logging - Hybrid tracing. Link Testing [2,3] : Link testing is an approach which determines the upstream of attacking traffic hop-by-hop while the attack is in progress. The majority of active traceback strategies begin as the router best for the target and interactively test their upstream hyperlinks till they will decide which one is used to carry the attacker's traffic. In a perfect world, this method is rehashed recursively on the upstream router until the source is reached. Below we summarize two varieties of link testing schemes: Input Debugging: Numerous routers incorporate a component called input debugging. In Input Debugging, the victim needs to perceive that it is being attacked and needs to build up an attack signature that describes a common feature contained in all the attack packets. The most emergent problem with the input debugging approach, even with automated tools, is the management overhead, the co- ordination from the network admin. If the admin is unavailable or if he lacks the skill to assist the traceback, then the traceback process may be sluggish or its completion could be unattainable. Controlled Flooding: Another link testing traceback technique called Control Flooding which does not require any support from network operators. This technique tests incoming links of the victim by iteratively flooding each link with large bursts of traffic to see its effect on the incoming traffic. By observing the change in the rate of packets received, the victim can infer from which link the attack
  • 2. Comparative Study of IP Trace back Techniques (J4R/ Volume 02 / Issue 02 / 007) All rights reserved by www.journalforresearch.org 43 packets have arrived. This procedure is applied to the next upstream router until the origin of attack is reached. This kind of traceback by itself floods the network. Controlled flooding is also poorly suited for tracing distributed denial-of-service attacks because the link-testing mechanism is inherently noisy and it can be difficult to discern the set of paths being exploited when multiple upstream links are contributing to the attack. Finally, like all link-testing schemes, controlled flooding is only effective at tracing an on-going attack and cannot be used “post-mortem”. Packet Marking Packet marking methods relies on the routers in the network to send their identities to the destinations either by encoding this information directly in rarely used bits of the IP Header, or by generating new packet to the same destination. They have the drawback in that they require large number of attack packets to be collected by the victim to infer the attack paths. [5] Packet marking methods require routers modify the header of the packet to contain the information of the router and forwarding decision. Hence the receiver of the packet can then reconstruct the path of a packet (or an attacking flow) from the received packets. [1] As Packet marking methods do not cost storage resource on routers and the link bandwidth resource, they are generally considered to be lightweight. Because however, packet marking is not a widely supported function on routers; thus, it is difficult to enable packet marking traceback in the network. There are two approaches of packet marking schemes: - Probabilistic Packet Marking - Deterministic Packet Marking Probabilistic Packet Marking [3] Probabilistic packet marking makes use of the Identification field as the marking space and stores the link information. It divides the IP address into eight fragments, 4 bits for each. This IP address fragment and the same offset fragment of the next router compose the edge fragment with 8 bits. The offset flag needs 3 bits for eight fragments, and the last 5 bits are enough to show the hop number. It is reported that few packets exceed 25 hops in the forwarding network [9] . When a router decides to mark a packet, it chooses a random fragment of its IP address, and records the fragment offset with the distance field set to 0. The advantage of PPM is that it needs no storage overhead for each router. But the drawbacks are also apparent. Victim needs a large number of packets to reconstruct the attack path, and PPM does not have the ability to trace a single packet. Fig. 1: Probabilistic Packet Marking Method Probabilistic Packet Marking Method [2,9] is shown in Fig. 1. In this techniques, each router marks the packet with some probability say p for example p = 1/100 which implies marking one packet for every 100 packets received. The marking field uses 16 bits identification field in the header, of which 5 bits are used for marking hop count, which would be a useful information during reconstruction of attack path, and the remaining bits are used by the router to send its information. Larger information can be broken into fragments and marked in multiple packets. The marked packets will therefore contain only partial information of the path. This reduces the storage overhead in the packets. The victim has to receive enough number of packets to re-construct the path. Prior knowledge of the topology does not require in this scheme. The disadvantage of this scheme is that it produces many false positives and the mark field value written by routers far away from victim might be overwritten by the routers closer to the victim and if the attacker is aware of the scheme, then the traceback fails. The marking field is used to hold start, end and distance. The start and end fields store the IP addresses of the routers residing at the two end points making an edge and the distance field registers the number of hops between this edge marked and the victim.
  • 3. Comparative Study of IP Trace back Techniques (J4R/ Volume 02 / Issue 02 / 007) All rights reserved by www.journalforresearch.org 44 Deterministic Packet Marking [3] Fig. 2: Deterministic Packet Marking Method Deterministic Packet Marking scheme (DPM) is shown in Fig. 2. This technique overcomes the disadvantages of PPM. Every packet passing through the first ingress edge router is only marked with the IP address of the router. The IP address is divided into two fragments (16 bits each) and each fragment is randomly recorded into each inflowing packet. The entire IP address is recovered by the victim when the victim obtains both the fragments of the same ingress router. This scheme fails when the source address is spoofed and is also false positive. The enhanced schemes [7,8] are proposed where the IP address is split into more fragments, and a hash function is used to contain the identity of the ingress router to decrease the false positive. Deterministic packet marking based on redundant decomposition is proposed in [10] . The knowledge of topology plays a significant role in DPM scheme’s traceback. Consider the DPM scheme suggested in [11] where, it is assumed that the topology of the network is known in advance. The packet marking method involves hash of ingress router’s IP address. The hash value is split into chunks and each chunk is marked into the packet randomly. With the topology known, the victim performs traceback of the marked routers. Large numbers of packets are not required for traceback in this scheme but it consumes a longer search time to identify the origin. The traceback scheme is challenged, if the topology is modified. When an intermediate router goes off, the traceback can be carried out with the topology but might turn to be false positive. If the attacker modifies the mark field, this scheme will fail to traceback. Instead of IP address respective bit fields were marked in [12] . In Flexible Deterministic Packet Marking (FDPM) scheme [13, 14] , the marking field length is varied according to the requirement. The length of the marking field is flexible and can be adjusted. Further, the marking rate can also be adaptively changed according to the incoming traffic load on the participating router. FDPM is capable of tracing a large number of real sources with low false positive rate and low resource requirement on routers. ICMP Traceback[3] Internet Control Message Protocol (ICMP) in would like of trace out full path of the attacks. Typically this scheme is for each router to come upwith an ICMP traceback message or reach directed to the identical destination because the elite packet. The trace message itself consists of consequent and previous hop data and a time stamp. Fig. 3: ICMP Traceback A traceback scheme utilizing the explicitly generated ICMP Traceback message was proposed in [15] . Each router samples the forwarding packets with a low probability (e.g. 1/20000) and sends a special ICMP message including the information like neighboring routers (forward and backward links) on the path to the destination and source along with the original (triggering)
  • 4. Comparative Study of IP Trace back Techniques (J4R/ Volume 02 / Issue 02 / 007) All rights reserved by www.journalforresearch.org 45 packet. Traceback packet also includes an authentication field which guards against spoofed traceback packets sent from attackers. This field can be null authentication, random strings or even HMACs. TTL is set to 255 for computing distance at the receiving end. During DDoS flooding attack, these ICMP traceback messages are used by the victim to reconstruct the path taken by the attacker. The schematic representation of the scheme is shown in Figure 5. The updated version of the previous iTrace (ICMP Traceback) scheme was proposed in [16] . iTrace scheme is considered as an industry standard by IETF. The time taken for path reconstruction by iTrace is minimized in ICMP Traceback with cumulative path (iTrace CP) [17] . This scheme is independent of the attack length. This scheme encodes the entire attack path information (i.e. contains the addresses of all the routers on the attack path) into minimal number of packets, thus minimizing the attack path construction time. This is achieved at the expense of minimal additional overhead in computation, storage and bandwidth. An enhancement to this scheme is suggested in Enhanced ICMP Traceback with Cumulative Path [18] , which suggests the exponential increase in the probability of message generation with the distance in hops from the victim. The effectiveness of the scheme relies on selecting the appropriate value for the probability exponent which influences the traceback time for attack paths of different length. The iTrace scheme suffers a serious problem on the resource spent on generating the number of traceback packets which turns out to be neither useful nor informative during traceback and this issue is addressed in Intention-driven ICMP traceback [19] which enhances the probability of the router to generate useful trace messages. This is achieved by adding an additional intention bit to the iTrace message. A modification to Intention driven traceback is provided in [20] to create more effective iTrace packets to detect the origin of attack more accurately. Logging [3] This solution involves storing packet digests or signatures at intermediate routers. The drawbacks of this technique include significant amount of resources have to be reserved at intermediate routers and hence large overhead on the network, complexity, centralized management. Fig. 4: Logging Packet Logging is suggested to log packets at key routers and so use data-mining techniques to see the trail that the packets traversed. It has the valuable property that it will trace an attack long once the attack has completed. This system has drawbacks, and probably huge resource needs and large scale interprovider information integration tough. Logging scheme for IP traceback stores the information like packet’s digest, signature, and fields of IP header on all or few routers which forward packets within the domain. It is shown in Figure 6. When an attack is detected, the victim requests the upstream router to gather information about attack packet. If the information is found, then the router is counted as a hop in the attack path and the process is repeated. Hybrid Traceback [3] This solution achieves the best of both the worlds: small number of attack packets to conduct the traceback process and small number of resources to be allocated at intermediate routers for packet logging purposes. The idea of hybrid scheme combining marking and logging has been conceived to overcome the disadvantage of individual marking and logging schemes as stated above and a drastic improvement in traceback has been achieved. In [21] , two hybrid schemes of IP traceback are proposed – Distributed Linked List Traceback (DLLT) and Probabilistic Pipeline Packet Marking (PPPM). The first scheme preserves the marking information at the core routers in a precise way such that it can be collected using a linked-list based approach. The second scheme aims at passing the IP addresses of the routers that were involved in marking particular packets by stuffing them into the packets going to the same destination. This mechanism avoids the need for long-term storage at the core routers. This scheme can fail if IP marking field value is spoofed by the adversary but can be
  • 5. Comparative Study of IP Trace back Techniques (J4R/ Volume 02 / Issue 02 / 007) All rights reserved by www.journalforresearch.org 46 identified with the help of restrictions imposed on TTL field. When compared to IP logging schemes, processing and storage overhead at the routers are significantly minimized using this Hybrid Scheme. III. PASSIVE IP TRACEBACK Here natural Internet-scale Passive IP traceback (PIT) approach that requires no ISP deployment. PIT analyzes packets collected from network telescopes, and infers the locations of spoofed traffic. The intuition behind PIT is that spoofing flows may trigger ICMP error messages at routers on the path to victim. These ICMP messages are sent to the spoofed nodes. Under the assumption that attackers use randomly forged addresses, some of these ICMP messages will be received by the network telescopes. The addresses of routers sending the message can be combined with an Internet route model to re-construct the attack path and find the locations of the spoofers. Fig. 5: Passive IP traceback IV. COMPARISON OF VARIOUS IP TRACEBACK TECHNIQUES Table – 1 Various IP Traceback Techniques [3] Link Testing Packet Marking Packet Logging ICMP Traceback Hybrid PPM DPM Deployability Fair Fair Fair Poor. Huge memory requiremet Good Fair Scalability Poor Poor Fair Fair Good Fair Memory Requirement (Network) Not Required Not Required Not Required Very High Not Required Low Memory Requirement (Victim) Not Required Very High Medium Not Required Medium Not Required Router Processing overhead High Medium Medium High Low Low Reliability Good Good Good Poor Good and Practically feasible Poor Parameter needed for traceback Attack pattern and large number of packets Large No. of packet Minimum number of packets compared to PPM One Packet No.of ICMP messages and huge number of attack packets. One Packet Applicability on different types of attacks DoS DoS/ DDoS flooding attacks DoS/DDoSflooding attacks DoS/DDoS flooding attacks DoS/DDoS network layer attacks DoS/ DDoS flooding attacks Prior knowledge of different topology Needed Not needed. Faster traceback and low false positive if known Not needed. Faster traceback and low false positive if known Not Needed Not Needed Not Needed Accuracy Medium Medium, huge false positive rate in case of DDoS attack Good Medium with high false positive and false negative Good for less number of attackers High. less false positive and false negative rate.
  • 6. Comparative Study of IP Trace back Techniques (J4R/ Volume 02 / Issue 02 / 007) All rights reserved by www.journalforresearch.org 47 Post Attack Analysis Not Possible Possible Possible Possible Possible Possible Attacker challenge vs. Scheme’s survival Poor Poor Poor Poor Poor Poor Router Involvement during Traceback High Nil Nil High Nil High V. CONCLUSION The comparing traceback mechanism by considering different categories like Deployability, Router Involvement during Traceback, Parameter needed for traceback, Router Processing overhead, Memory Requirement (Network), Memory Requirement(Victim), Reliability. the advantages and disadvantages of the all mechanisms are described. REFERENCES [1] Guang Yao; Jun Bi; Vasilakos, A.V., "Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter," in Information Forensics and Security, IEEE Transactions on , vol.10, no.3, pp.471-484, March 2015 doi: 10.1109/TIFS.2014.2381873 [2] S. Savage, D. Wetherall, A. Karlin, and T. Anderson, “Practical network support for ip traceback,” in Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, ser. SIGCOMM ’00. New York, NY, USA: ACM, 2000, pp. 295–306. [3] Vijayalakshmi Murugesan, Mercy Shalinie, and Nithya Neethimani, “A Brief Survey of IP Traceback Methodologies”, Department of Computer Science and Engineering, Thigarajar College of Engineering, Thiruparankundram, Madurai – 625015, Tamilnadu, India [4] DONG YAN, YULONG WANG, SEN SU and FANGCHUN YANG A Precise and Practical IP Traceback Technique Based on Packet Marking and Logging State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing, 100876 P.R. China [5] B. Sai Priyanka, N. Srihari Rao, “IP Traceback Techniques – A Selective Survey” Department of Computer Science & Engineering, CMR Institute of Technology, Hyderabad, A.P International Journal of Computer Science and Mobile Applications, Vol.1 Issue. 3, September- 2013, pg. 40-44 ISSN: 2321- 8363 [6] K. Arun Kumar, K. Sai Ashritha, “Analysis of Various IP Traceback Techniques - A Survey” Department of Computer Science & Engineering, CMR Institute of Technology, Hyderabad, A.P International Journal of Computer Science and Mobile Applications (0975 – 8887), Volume 77– No.13, September 2013ISSN: 2321-8363 [7] A. Belenky and N. Ansari, “Ip traceback with deterministic packet marking,” IEEE Communications Letters, vol. 7, no. 4, pp. 162–164, 2003. [8] Belenky and N. Ansari: On Deterministic Packet Marking, Computer Networks, Vol. 51, No. 10, 2007, pp. 2677-2700 [9] S. Savage, D. Wetherall, A. R. Karlin, T. E. Anderson: Network Support for IP Traceback, IEEE/ACM Transactions on Networking, Vol. 9, No. 3, 2001, pp. 226-237 [10] G. Jin and J. Yang: Deterministic Packet Marking Based on Redundant Decomposition for IP Traceback, IEEE Comm. Letters, Vol. 10, No. 3, 2006, pp. 204-206 [11] Wang Xiao-jing, Wang Xiao-yin: Topology Assisted Deterministic Packet Marking for IP Traceback, The Journal of China Universities of Posts and Telecommunications, Vol. 17, No. 2, April 2010, pp. 116-121 [12] Y. Kim, J. Y. Jo, and F. L. Merat: Defeating Distributed Denial-of-Service Attack with Deterministic Bit Marking, Proc. IEEE Global Telecomm. Conf. (GLOBECOM ’03), 2003, pp. 1363-1367 [13] Y. Xiang, W. Zhou, and J. Rough: Trace IP Packets by Flexible Deterministic Packet Marking (FDPM), Proc. IEEE Int’l Workshop IP Operations and Management (IPOM ’04), 2004, pp. 246-252 [14] Y.Xiang, W.Zhou and M.Gu: Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks, IEEE Trans. Parallel and Distributed System, Vol. 20, No. 4, April 2009, pp. 567- 580 [15] S. M. Bellovin: ICMP Traceback Messages, Internet Draft: draft-bellovin-itrace-00.txt, 2000 [16] S. M. Bellovin, M. D. Leech, and T. Taylor: ICMP Traceback Messages, Internet Draft: Draft-Ietf-Itrace-04.Txt, Feb. 2003 [17] Henry C. J. Lee, Vrizlynn L. L. Thing, Yi Xu, Miao Ma: ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback, International Conference on Information and Communications Security, Oct. 2003 [18] V. L. L. Thing , H. C. J. Lee , M. Sloman and J. Zhou: Enhanced ICMP Traceback with Cumulative Path, 61st IEEE Veh. Technol. Conf., 2005 [19] Felix, W. (2001): On Design and Evaluation of Intention-Driven ICMP traceback, Proc. IEEE Int'l Conf. Computer Comm. and Networks, IEEE CS Press, 2001, pp. 159-165 [20] Izaddoost, M. Othman, and M. F. A. Rasid: Accurate ICMP Traceback Model under DoS/DDoS Attack, in Proceedings of the 15th International Conference on Advanced Computing and Communications, 2007 [21] B.Al-Duwari and M. Govindarasu: Novel Hybrid Schemes Employing Packet Marking and Logging for IP Traceback, IEEE Trans. Parallel Distributed Syst., Vol. 17, No. 5, May 2006, pp. 403-418