Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Enhanced IP Spoofers Identification and Prevention System


     

   Subscribe/Renew Journal


Attackers may use forged IP address to hide their real locations. To find the attackers, many mechanism have been used. The mist on the locations of spoofers has never been dissipated till now. we proposes Passive IP Trace back (PIT) which bypasses the deployment difficulties of IP trace back process. PIT investigates ICMP error messages triggered by spoofing traffic, and tracks the spoofers based on public available information. In this way, PIT can find the spoofers without any deployment requirement. This paper illustrates the causes, group effectiveness of PIT, and shows to find out the locations of attackers through applying PIT on the path backscatter dataset. These results can shows further reveal IP spoofing, which has been studied for far but never well understood. Though PIT cannot work in all the spoofing attacks, it may be the most useful mechanism and the statistical results on path backscatter.


User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 226

PDF Views: 1




  • Enhanced IP Spoofers Identification and Prevention System

Abstract Views: 226  |  PDF Views: 1

Authors

Abstract


Attackers may use forged IP address to hide their real locations. To find the attackers, many mechanism have been used. The mist on the locations of spoofers has never been dissipated till now. we proposes Passive IP Trace back (PIT) which bypasses the deployment difficulties of IP trace back process. PIT investigates ICMP error messages triggered by spoofing traffic, and tracks the spoofers based on public available information. In this way, PIT can find the spoofers without any deployment requirement. This paper illustrates the causes, group effectiveness of PIT, and shows to find out the locations of attackers through applying PIT on the path backscatter dataset. These results can shows further reveal IP spoofing, which has been studied for far but never well understood. Though PIT cannot work in all the spoofing attacks, it may be the most useful mechanism and the statistical results on path backscatter.