2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) 2015
DOI: 10.1109/ssic.2015.7245326
|View full text |Cite
|
Sign up to set email alerts
|

Survey on packet marking fields and information for IP traceback

Abstract: Not all header fields in IP packets are used simultaneously during transmissions. Some fields may provide traceback services, especially for the defense against DDoS attacks. In this paper, we analyze which IP header fields may be used without impacting the other services provided by the IP protocol. We also analyze how unused fields can be filled for the purpose of traceback, and with what probability can a router mark packets. Finally we compare the different existing methods for packet marking based on the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2017
2017

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 29 publications
(62 reference statements)
0
2
0
Order By: Relevance
“…The hop count was then used to decide if the packet would be marked in that router. According to , studies that use TTL field for marking should take serious precautions because the packet is dropped if the TTL value reaches zero. A study in proposed a passive IP traceback mechanism for tracking the spoofers locations based on the error messages of Internet Control Message Protocol that may be triggered by spoofing traffic.…”
Section: Related Workmentioning
confidence: 99%
“…The hop count was then used to decide if the packet would be marked in that router. According to , studies that use TTL field for marking should take serious precautions because the packet is dropped if the TTL value reaches zero. A study in proposed a passive IP traceback mechanism for tracking the spoofers locations based on the error messages of Internet Control Message Protocol that may be triggered by spoofing traffic.…”
Section: Related Workmentioning
confidence: 99%
“…As the number of users are growing, the crime is also growing. Many techniques like input debugging, controlled flooding and ICMP messaging have been developed to identify attackers 1,4 but none of these techniques have been succeeded. To find the DDoS attackers the only method is IP traceback because the source address can be spoofed.…”
Section: Introductionmentioning
confidence: 99%