scholarly journals Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT

Author(s):  
Brian Cusack ◽  
Zhuang Tian ◽  
Ar Kar Kyaw
2017 ◽  
Vol 10 (2) ◽  
pp. 507-512
Author(s):  
Y Bhavani ◽  
V. Janaki ◽  
R. Sridevi

Distributed Denial of Service (DDoS) attack is an unavoidable attack. Among various attacks on the network, DDoS attacks are difficult to detect because of IP spoofing. The IP traceback is the only technique to identify DDoS attacks. The path affected by DDoS attack is identified by IP traceback approaches like Probabilistic Packet marking algorithm (PPM) and Deterministic Packet Marking algorithm (DPM). The PPM approach finds the complete attack path from victim to the source where as DPM finds only the source of the attacker. Using DPM algorithm finding the source of the attacker is difficult, if the router get compromised. Using PPM algorithm we construct the complete attack path, so the compromised router can be identified. In this paper, we review PPM and DPM techniques and compare the strengths and weaknesses of each proposal.


Distributed Denial of Service (DDoS) attack is a significant threat in today's world. Attackers hide their identity by spoofing and defending. To quickly detect a spoofed Internet Protocol (IP) during a DDoS attack the number of time-to-live hops in the network can be evaluated. While using time-to-live, if the routers gets compromised it may lead to the wrong detection of spoofed IP when both the source and attacker are at same distance. To identify an attacker, this system proposes an enhanced packet marking and traceback algorithm for IP traceback that helps the traceback of the spoofed packet to its source. A number of IP traceback techniques exist, but they have limitations like the number of packets required or storage and computational overheads incurred at routers. The technique proposed reduces marking and storage overhead..


2014 ◽  
Vol 1049-1050 ◽  
pp. 1820-1823
Author(s):  
Zhuo Tian ◽  
Bai Cheng Li

DDoS attack threatens the stable development of internet and national information security seriously. IP traceback technology can track the attack packages to the attack source, and is making an important significance in against DDoS attack. For the DDoS attack, the basic theory and advantages and disadvantages of several common IP traceback technologies are analyzed and compared. Some ideas to improve the technologies are proposed by analyzing some current problems of IP traceback and source-finding technologies.


Sign in / Sign up

Export Citation Format

Share Document