Downloads: 119 | Views: 279
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 7 / 10
A Survey on Novel Flow Marking IP Traceback Schemes
S. M. Chaware, Shubhangi R. Sardar
Abstract: In recent years, communication and data stored over the World Wide Web (www) increased enormously. At the same time attacks over internet have increased. As a result, lots of researches have been done on securing the internet infrastructure. Due to trusting nature of IP, the source address of a packet is never authenticated. This leads to the need of some technique to find the source of transmitted packet. IP traceback has become widely used technique for these researches. In previous IP traceback methods, finding exact source of attack and reconstructing the attack path was two major issues. Deterministic Flow Marking (DFM) provides an innovative approach to overcome these issues. It traces the origin of spoofed source IP Address of attacker node and provides an optional authentication approach for the victim. In this paper, a wide survey has been carried out to identify and classify the existing IP traceback schemes.
Keywords: DDoS Attack, IP Traceback, Packet Marking
Edition: Volume 3 Issue 12, December 2014
Pages: 194 - 197
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 102
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1809 - 1812Efficient Flow Marking IP Traceback System
Sonali H. Mane, S. Pratap Singh
Downloads: 102
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2832 - 2836Minimization of DDoS Attack using Firecol an Intrusion Prevention System
Bhagyashri Kotame, Shrinivas Sonkar
Downloads: 102
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1612 - 1616Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks
Vishal Mahale, Deepali Gothawal
Downloads: 103
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1368 - 1371Spam and Zombie Detection System with Machine Learned Spot Algorithm
Manishankar.S, Sobin E. S
Downloads: 104
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2982 - 2984Protection of Server from Proxy Based HTTP Attacks
Poonam Uttam Patil, Y. V. Chavan