z-logo
open-access-imgOpen Access
Survey on Cloud Based IP Traceback Authentication Framework
Author(s) -
T Aswathy,
Misha Ravi
Publication year - 2018
Publication title -
international journal of engineering and computer science
Language(s) - English
Resource type - Journals
ISSN - 2319-7242
DOI - 10.18535/ijecs/v7i3.10
Subject(s) - ip traceback , computer science , computer network , computer security , security token , authentication (law) , network packet , denial of service attack , the internet , world wide web
IP traceback is used to find network traffic attack. Origin of IP packet is not authenticated. So source of  IP  address is not trusted. A time limited token based authentication framework for authenticating traceback service queries is implemented. The design objective of the framework is preventing the illegal users for accessing traceback information.Thus to prevent network traffic attack

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here