z-logo
open-access-imgOpen Access
Passive IP Trace back using Border Gateway Protocol (BGP)
Author(s) -
S. Philomina,
M. Jasmin,
Ranjani Narayan
Publication year - 2019
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.i3247.0789s319
Subject(s) - computer network , computer science , network address translation , nat traversal , overlay network , ip address management , ip tunnel , ip forwarding , default gateway , the internet , internet protocol , computer security , routing protocol , network packet , operating system , routing table
Nowadays networks are becoming credential due to its robustness, reliability and flexibility. It got evolved with the high latency networks comprises of several workstations. Many routed protocols like IP and IPv6 are responsible to transmit the data traffic across remote network. Another factor in allocating logical address is to identify the physical address of the host in the local network. It is mandatory to allocate the IP address to transmit the data in the network. This cause the intruders to trespass into the network. They are classified as many types but we are dealing with spoofers. Our intention is to identify the spoofer’s location and to eradicate them by using overlay network. In this paper, we will discuss about the existing works and our proposed method.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here