z-logo
open-access-imgOpen Access
A Marking/Traceback System for Detecting the Source of Dos/Ddos Attacks
Publication year - 2019
Publication title -
international journal of engineering and advanced technology
Language(s) - English
Resource type - Journals
ISSN - 2249-8958
DOI - 10.35940/ijeat.a1638.129219
Subject(s) - ip traceback , denial of service attack , spoofing attack , computer network , computer science , network packet , application layer ddos attack , ip address spoofing , computer security , trinoo , internet protocol , the internet , operating system , network address translation
Distributed Denial of Service (DDoS) attack is a significant threat in today's world. Attackers hide their identity by spoofing and defending. To quickly detect a spoofed Internet Protocol (IP) during a DDoS attack the number of time-to-live hops in the network can be evaluated. While using time-to-live, if the routers gets compromised it may lead to the wrong detection of spoofed IP when both the source and attacker are at same distance. To identify an attacker, this system proposes an enhanced packet marking and traceback algorithm for IP traceback that helps the traceback of the spoofed packet to its source. A number of IP traceback techniques exist, but they have limitations like the number of packets required or storage and computational overheads incurred at routers. The technique proposed reduces marking and storage overhead..

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here