2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing 2011
DOI: 10.1109/iihmsp.2011.89
|View full text |Cite
|
Sign up to set email alerts
|

Single-Packet IP Traceback with Less Logging

Abstract: Currently, the main threats of network security are coming from hacker intrusion, deny of service (DoS), computer virus, worm, spam, malicious code and sniffer because there are many weaknesses in the original design of IPv4. One is that attackers could send IP spoofing packets which is he wants to attack. That is the attackers modify the IP from the true one to another on the IP field. However, it is hard to trace the source of attacks from victims. In this paper, we will propose a method that reduces the sto… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…In the connection of dos / DDoS attack, the victimized people could settle on utilization of the accepted ITrace messages will build the strike ways and eventually recognize the attackers [5]. Since every ITrace message best convey particular case alternately two joins of the whole path, those victimized person will must reconstruct the path.…”
Section: Icmp Trace Back With Cumulative Path (I Trace-cp)mentioning
confidence: 99%
See 4 more Smart Citations
“…In the connection of dos / DDoS attack, the victimized people could settle on utilization of the accepted ITrace messages will build the strike ways and eventually recognize the attackers [5]. Since every ITrace message best convey particular case alternately two joins of the whole path, those victimized person will must reconstruct the path.…”
Section: Icmp Trace Back With Cumulative Path (I Trace-cp)mentioning
confidence: 99%
“…But it could track the network traffic to a certain number of packets due to its probabilistic nature. In packet logging, the IP packet is logged meaning the packets which are outgoing from the router have their details scanned at and through each router it passes [5]. Usually, packet logging was thought to be impractical due to lot of reasons one of which being the enormous storage space for packet logs.…”
Section: Ip Trace Backmentioning
confidence: 99%
See 3 more Smart Citations