Illegal packet tracing and track hackers using IP traceback scheme

K. Shala, G. Shenbagamoorthy
{"title":"Illegal packet tracing and track hackers using IP traceback scheme","authors":"K. Shala, G. Shenbagamoorthy","doi":"10.1109/ICCTET.2013.6675973","DOIUrl":null,"url":null,"abstract":"In this paper we are tracing the origin of the fake packet. For this we are using the extended RIHT and MABS technology using. [1]Conventional block-based multicast authentication schemes overlook the heterogeneity of receivers by letting the sender choose the block size, divide a multicast stream in blocks, associate each block with a signature, and spread the effect of the signature across all the packets in the block through hash graphs or coding algorithms. The correlation among packets makes them vulnerable to packet loss, which is inherent in the Internet and wireless networks. Moreover, the lack of Denial of Service resilience renders most of them vulnerable to packet injection in hostile environments. In this paper, we propose a novel multicast authentication protocol, namely including two schemes. The basic scheme eliminates the correlation among packets and thus provides the perfect resilience to packet loss, and it is also efficient in terms of latency, computation, and communication overhead due to an efficient cryptographic primitive called batch signature, which supports the authentication of any number of packets simultaneously. We also present an [2]DSA algorithm which ensure that data is coming from admin or not.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCTET.2013.6675973","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

In this paper we are tracing the origin of the fake packet. For this we are using the extended RIHT and MABS technology using. [1]Conventional block-based multicast authentication schemes overlook the heterogeneity of receivers by letting the sender choose the block size, divide a multicast stream in blocks, associate each block with a signature, and spread the effect of the signature across all the packets in the block through hash graphs or coding algorithms. The correlation among packets makes them vulnerable to packet loss, which is inherent in the Internet and wireless networks. Moreover, the lack of Denial of Service resilience renders most of them vulnerable to packet injection in hostile environments. In this paper, we propose a novel multicast authentication protocol, namely including two schemes. The basic scheme eliminates the correlation among packets and thus provides the perfect resilience to packet loss, and it is also efficient in terms of latency, computation, and communication overhead due to an efficient cryptographic primitive called batch signature, which supports the authentication of any number of packets simultaneously. We also present an [2]DSA algorithm which ensure that data is coming from admin or not.
使用IP回溯方案跟踪非法数据包和跟踪黑客
在本文中,我们正在追踪假冒数据包的来源。为此我们采用了扩展的right和MABS技术使用。[1]传统的基于块的组播认证方案通过让发送方选择块大小,将组播流划分为块,将每个块与签名相关联,并通过哈希图或编码算法将签名的效果传播到块中的所有数据包,从而忽略了接收方的异质性。数据包之间的相关性使它们容易丢失数据包,这是互联网和无线网络固有的。此外,缺乏拒绝服务弹性使得它们中的大多数容易受到恶意环境中的数据包注入的攻击。本文提出了一种新的组播认证协议,即包含两种方案。基本方案消除了数据包之间的相关性,从而提供了对数据包丢失的完美弹性,并且由于一种称为批处理签名的高效加密原语,它在延迟、计算和通信开销方面也很有效,该原语支持同时对任意数量的数据包进行身份验证。我们还提出了一种[2]DSA算法,该算法可以确保数据是否来自管理员。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信