International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 127 | Views: 271

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014 | Popularity: 6.2 / 10


     

Design and Implementation of ADFM in Network Processor

Gayatri Ratilal Mali, N. P. Karlekar


Abstract: Denial of service attack denies services given by resources to the legitimate clients. DOS Attacker uses IP spoofing technique to hide their own identity, so first step to defend against DoS Attack is to find out IP address of the attacker to take further action. This paper represents a novel and practical IP trace back system, Flexible Deterministic Packet Marking (ADFM) to get IP address of the attacker when IP spoofing technique is used by attacker. ADFM belongs to the packet marking family of IP trace back systems. The novel characteristics of ADFM are in its flexibility: first, it can adjust the length of marking field according to the network protocols deployed (flexible mark length strategy) ; second, it can also adaptively change its marking rate according to the load of the participating router by a flexible flow-based marking scheme. This paper focuses on implementation of ADFM on network processor.


Keywords: ADFM, network processor, IP traceback, packet marking, DDoS, PPM, DPM


Edition: Volume 3 Issue 7, July 2014


Pages: 1568 - 1571



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Gayatri Ratilal Mali, N. P. Karlekar, "Design and Implementation of ADFM in Network Processor", International Journal of Science and Research (IJSR), Volume 3 Issue 7, July 2014, pp. 1568-1571, https://www.ijsr.net/getabstract.php?paperid=20141292, DOI: https://www.doi.org/10.21275/20141292



Similar Articles

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023

Pages: 2571 - 2575

Enhancing IoT Cybersecurity with Graph Neural Networks: Advanced Anomaly Detection and Threat Mitigation

Harish Narne

Share this Article

Downloads: 42 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Downloads: 102

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1612 - 1616

Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks

Vishal Mahale, Deepali Gothawal

Share this Article



Top