A Low Traceback and Zero Logging Overhead IP Traceback Approach for Communication Networks

S. Malliga, S. V. Kogilavani, P. Nandhini
{"title":"A Low Traceback and Zero Logging Overhead IP Traceback Approach for Communication Networks","authors":"S. Malliga, S. V. Kogilavani, P. Nandhini","doi":"10.1109/I2C2SW45816.2018.8997378","DOIUrl":null,"url":null,"abstract":"In an IP address spoofing attack, attackers send IP packets from a forged source address in order to camouflage themselves. Denial of Service attacks quite often employ IP spoofing to overwhelm a target with packets that appear to have come from legitimate IP addresses. Such attacks may be prevented by tracing these attacks back to their origin. IP traceback is a technique which plays a vital role in finding the source of spoofed packets. This paper reviews an ICMP traceback method, SPITRI and suggests a few changes in the way the packets are marked and tracked back. The proposed marking scheme reduces the number of clock cycles needed for marking and tracking back. Also, it does not require logging at any of the routers. The simulation results demonstrate that the refinements reduce the time for marking and tracing back with 100% accuracy.","PeriodicalId":212347,"journal":{"name":"2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW)","volume":"275 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I2C2SW45816.2018.8997378","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

In an IP address spoofing attack, attackers send IP packets from a forged source address in order to camouflage themselves. Denial of Service attacks quite often employ IP spoofing to overwhelm a target with packets that appear to have come from legitimate IP addresses. Such attacks may be prevented by tracing these attacks back to their origin. IP traceback is a technique which plays a vital role in finding the source of spoofed packets. This paper reviews an ICMP traceback method, SPITRI and suggests a few changes in the way the packets are marked and tracked back. The proposed marking scheme reduces the number of clock cycles needed for marking and tracking back. Also, it does not require logging at any of the routers. The simulation results demonstrate that the refinements reduce the time for marking and tracing back with 100% accuracy.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
通信网络的低回溯和零日志开销IP回溯方法
在IP地址欺骗攻击中,攻击者通过伪造的源地址发送IP报文来伪装自己。拒绝服务攻击通常使用IP欺骗,用看似来自合法IP地址的数据包压倒目标。可以通过追踪这些攻击的源头来防止这些攻击。IP回溯是一种查找欺骗报文来源的重要技术。本文回顾了一种ICMP回溯方法SPITRI,并建议在标记和回溯数据包的方式上进行一些更改。所提出的标记方案减少了标记和跟踪所需的时钟周期数。此外,它不需要在任何路由器上进行日志记录。仿真结果表明,改进后的标记和回溯时间缩短,准确率达到100%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Low Cost Raspberry Pi Oscilloscope A Low Traceback and Zero Logging Overhead IP Traceback Approach for Communication Networks A Novel Architecture to Improve Performance of Photovoltaic Cells using Lens Let Arrays I2C2SW 2018 TOC Performance Comparison of Adaptive Filters for Speckle Noise Reduction in SAR Images
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1