Downloads: 108
Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016
A Survey on IP Traceback Mechanisms
Aparna C Bhadran | Maria Joy
Abstract: Security is used to protect the vital information by allowing those who have the right to access and denying the access to those who dont have right. IP spoofing is one of the network attacks. The attackers will launch an attack by forging the source address. So they will be able to enhance the attacking without exposing their real location. The attackers uses fake source IP address to hide their actual places. To find the attackers so many IP traceback mechanisms have been proposed in this paper.
Keywords: Ingress Filtering, Link testing, Logging, ICMP traceback, Packet Marking
Edition: Volume 5 Issue 8, August 2016,
Pages: 1262 - 1265
Similar Articles with Keyword 'Logging'
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023
Pages: 2966 - 2970Security in Kubernetes: A Comprehensive Review of Best Practices
Downloads: 100
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2483 - 2487Accountability of Data usage in Cloud Computing
Nitin P. Doiphode | Hemlata Channe