SOverview of IP tracebacking using packet marking techniques

Swapnil M. Sanap, Pranav Pawar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

A network comprises of a plurality of nodes working together to perform similar or different tasks. The network has a huge room for attacks so as to make the network inefficient. The major attacks that are causing huge turbulences to the network and its equivalent resources include Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks. In prior-art there are many techniques that can sense and avoid these attacks. Packet Marking (PM) techniques are the most widely used successful techniques towards avoiding these attacks. However, there are some critical issues with the PM techniques, as these attacks are becoming more complicated due to growing talent in the market. PM technique can be used further to traceback the origin of attacks. In this traceback the major contest is to minimize the amount of packets in successful traceback of these attacks. The packets that are originating from the sources are not enough to traceback the origin. The paper discusses various known PM techniques available for fighting back against the mentioned attacks. Further, the paper also discloses the implementation of these techniques, their advantages, disadvantages, complexity analysis, and the results measured. Future trends including the need for effective and efficient defense mechanism are also discussed.

Original languageEnglish
Title of host publicationConference Proceeding - 2015 International Conference on Advances in Computer Engineering and Applications, ICACEA 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages816-820
Number of pages5
ISBN (Electronic)9781467369114
DOIs
StatePublished - 22 Jul 2015
Externally publishedYes
Event2nd International Conference on Advances in Computer Engineering and Applications, ICACEA 2015 - Ghaziabad, India
Duration: 19 Mar 201520 Mar 2015

Publication series

NameConference Proceeding - 2015 International Conference on Advances in Computer Engineering and Applications, ICACEA 2015

Conference

Conference2nd International Conference on Advances in Computer Engineering and Applications, ICACEA 2015
Country/TerritoryIndia
CityGhaziabad
Period19/03/1520/03/15

Bibliographical note

Publisher Copyright:
© 2015 IEEE.

Keywords

  • DDoS attacks
  • Deterministic Packet Marking (DPM)
  • DoS attacks
  • IP Trace backing
  • Marking probabilit
  • Packet Marking And Packet Logging
  • Packet marking
  • Probablistic Packet Marking (PPM)
  • Rout Based Packet Marking (RBPM)

Fingerprint

Dive into the research topics of 'SOverview of IP tracebacking using packet marking techniques'. Together they form a unique fingerprint.

Cite this