Open Access Open Access  Restricted Access Subscription Access

An Improved Method for Tracing IP Packet's Source


Affiliations
1 School of Information Technology and Engineering,VIT University, Vellore, Tamil Nadu – 632 014, India
 

IP spoofing and Denial of Service (DoS) has become the most important security threat faced by the Internet community today. One of the effective methods of defending against the types of attack is to efficiently locate its source(s). To locate the packet source, a 16-bit hybrid trace back method has been proposed. It uses both the marking and logging methods along with efficient storage method to achieve zero false positive and zero false negative rates. Furthermore, the evaluation of the proposed method on the basis of efficiency of trace back shows that it performs much better than the existing method.

Keywords

Denial of Service (dos), Hash Table, IP Spoofing, IP Trace Back
User

Abstract Views: 304

PDF Views: 0




  • An Improved Method for Tracing IP Packet's Source

Abstract Views: 304  |  PDF Views: 0

Authors

Chandrasekar Ravi
School of Information Technology and Engineering,VIT University, Vellore, Tamil Nadu – 632 014, India
P. S. Ramesh
School of Information Technology and Engineering,VIT University, Vellore, Tamil Nadu – 632 014, India
N. Deepa
School of Information Technology and Engineering,VIT University, Vellore, Tamil Nadu – 632 014, India

Abstract


IP spoofing and Denial of Service (DoS) has become the most important security threat faced by the Internet community today. One of the effective methods of defending against the types of attack is to efficiently locate its source(s). To locate the packet source, a 16-bit hybrid trace back method has been proposed. It uses both the marking and logging methods along with efficient storage method to achieve zero false positive and zero false negative rates. Furthermore, the evaluation of the proposed method on the basis of efficiency of trace back shows that it performs much better than the existing method.

Keywords


Denial of Service (dos), Hash Table, IP Spoofing, IP Trace Back



DOI: https://doi.org/10.17485/ijst%2F2014%2Fv7i5%2F54098