{"title":"Improved deterministic packet marking algorithm","authors":"A. Parashar, R. Radhakrishnan","doi":"10.1109/ICACT.2013.6710539","DOIUrl":null,"url":null,"abstract":"Today, Internet has become the primary source of communication in networks. The attack on its infrastructure poses a great challenge in its expansion. Distributed Denial of Service attacks is major source of attacks over the past decade. The goal of the attacker is to spoof the source of IP address to hide its source. Various IP traceback schemes such as Probabilistic Packet Marking, Deterministic Packet marking, TTL base Packet Marking and Hash base IP traceback schemes are proposed to trace source of the attacker. This paper discusses the Improved deterministic packet marking algorithm that is effective in taking appropriate action for the spoof packets along with identification of attacker.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACT.2013.6710539","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Today, Internet has become the primary source of communication in networks. The attack on its infrastructure poses a great challenge in its expansion. Distributed Denial of Service attacks is major source of attacks over the past decade. The goal of the attacker is to spoof the source of IP address to hide its source. Various IP traceback schemes such as Probabilistic Packet Marking, Deterministic Packet marking, TTL base Packet Marking and Hash base IP traceback schemes are proposed to trace source of the attacker. This paper discusses the Improved deterministic packet marking algorithm that is effective in taking appropriate action for the spoof packets along with identification of attacker.