V. Murali, Bhaskarant M a, S. N. Natarajan, Sivanandam, Ac In
{"title":"Analysis of IP Traceback Systems","authors":"V. Murali, Bhaskarant M a, S. N. Natarajan, Sivanandam, Ac In","doi":"10.1109/ISAHUC.2006.4290659","DOIUrl":null,"url":null,"abstract":"The problem of identifying the sources of a denial of service (DoS) and distributed denial of services (DDoS) attack is hardest in the Internet security area, because attackers often use incorrect or spoofed source addresses of IP packets. IP traceback system is to identify the origin of IP packets when the source address of these packets is spoofed. In the traceback system, routers are playing vital role and also ISP (Internet Service Provider) involvement is required to trace the origin of the spoofed packets. Several approaches have been proposed to trace IP packets to their origin. Our aim is to evaluate and analyses the most promising traceback approaches with our proposed system. We have implemented using NS-2 simulator and also evaluated and summarized the results.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISAHUC.2006.4290659","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
The problem of identifying the sources of a denial of service (DoS) and distributed denial of services (DDoS) attack is hardest in the Internet security area, because attackers often use incorrect or spoofed source addresses of IP packets. IP traceback system is to identify the origin of IP packets when the source address of these packets is spoofed. In the traceback system, routers are playing vital role and also ISP (Internet Service Provider) involvement is required to trace the origin of the spoofed packets. Several approaches have been proposed to trace IP packets to their origin. Our aim is to evaluate and analyses the most promising traceback approaches with our proposed system. We have implemented using NS-2 simulator and also evaluated and summarized the results.
DoS (denial of service)和DDoS (distributed denial of services)攻击的来源识别问题是互联网安全领域最难解决的问题,因为攻击者经常使用错误或欺骗的IP报文源地址。IP溯源系统是指当IP报文的源地址被欺骗时,识别IP报文的来源。在溯源系统中,路由器起着至关重要的作用,同时也需要ISP (Internet Service Provider)的参与来追踪欺骗报文的来源。已经提出了几种方法来跟踪IP数据包的来源。我们的目标是用我们提出的系统评估和分析最有希望的回溯方法。我们使用NS-2模拟器实现了该系统,并对结果进行了评估和总结。