scholarly journals A survey on existing IP trace back mechanisms and their comparisons

2018 ◽  
Vol 7 (1.9) ◽  
pp. 67
Author(s):  
Vahiduddin Shariff ◽  
Ruth Ramya K ◽  
B Renuka Devi ◽  
Debnath Bhattacharyya ◽  
Tai-hoon Kim

Security is the one of the main point of focus in recent trends of computer science, as it has to determine the right people accessing the system and ones who are trying the bypassing it. IP spoofing is one of the prevalent attacks, where the attackers launch the attack by spoofing the source address, once this happens they can attack without revealing their exact location. The attacker uses a fraudulent IP address to conceal their identity. To reveal the attackers real locations many IP trace back mechanisms have been proposed but the attacker immediately gets away with the information. There is another problem which is to detect DDoS traffic and the precarious packets set up by the attacker, which are a threat to the victim as well as the whole network, here lies another hurdle which is to differentiate between the attacker’s data traffic from the normal data traffic. There are many solutions given for this but one among them is IP trace back which already has researched upon in the past and implemented then, but what is lacking in the solution such that the attacks are even now taking place. IP trace back if modified, strengthened would analyze the traffic faster and trace out the attacker with a faster pace, which is why a hybrid IP tracing and tracking mechanism if introduced could ease the current problem.

Author(s):  
Alina Mihaela Dima

Many times, in the attempt to win or to maintain an advantageous position on the market, the economic agent will use a whole arsenal of practices (inclusively and mostly from the marketing field), most of them anticompetitive, with a negative impact on the business environment, which also affects the well-being of the consumer. The policy in the field of competition is the one that defines these types of behaviour and penalizes them depending on the importance of their negative impact, by creating a complex and coherent legislative and institutional mechanism. The right enforcement of the competition policy at the national level is the key in this process, but this should be coordinated with the regional and international objectives and regulations in this field. Romania is facing a double challenge: on the one side, it had to set up a competition policy, which was almost ignored before the90s, on the other side, it had to comply, recently, with high standards in the field, as an EU candidate. Now, as a member state, the promotion of a competition culture becomes a must, along with the design of an adequate system of information and knowledge dissemination for all of those involved. The paper is based on a original and qualitative research and aims at emphasising the increased necessity of the promotion of a competition culture for the competitiveness of the Romanian business environment on the European level in the new context of accession. This will help Romanian business to face the competition challenges within a more extended single European market, as an essential issue of the free market economy status recently granted, and accordingly to the most important EU objectives set up at Lisabon to become the most competitive economy in the world up to 2010.


2011 ◽  
Vol 403-408 ◽  
pp. 4469-4475
Author(s):  
S. Benson Edwin Raj ◽  
V.S. Jayanthi ◽  
R. Shalini

Botnets are growing in size, number and impact. It continues to be one of the top three web threats that mankind has ever known. The botnets are the souped-up cyber engines driving nearly all criminal commerce on the Internet and are seen as relaying millions of pieces of junk e-mail, or spam. Thus, the need of the hour is the early detection and identification of the heart of network packet flooding or the C&C centre. Most of the botmasters perform DDos attacks on a target server by spoofing the source IP address. The existing botnet detection techniques rely on machine learning algorithms and do not expound the IP spoofing issue. These approaches are also found to be unsuccessful in the meticulous identification of the botmasters. Here we propose an architecture that depend on the PSO-based IP tracebacking. Our architecture also introduces the IP spoofing detector unit so as to ensure that the Traceback moves in the right direction. The approach also detects the zombies and utilizes the PSO optimization technique that aid in the identification of the C&C node. The experimental results show that our approach is successful in prompt detection of the bots.


2008 ◽  
Vol 23 (1) ◽  
pp. 95-124
Author(s):  
Rachel Baird

AbstractThe right of prompt release has been interpreted by the International Tribunal for the Law of the Sea as a safeguard, balancing the right of the coastal State to detain and deal with arrested fishing vessels and crew on the one hand, with the interests of the flag State to secure the release of detained vessels on the other. As the incidence of illegal fishing within national fishing zones has increased in the past decade, many coastal States, such as Australia, have implemented increasingly harsh penalties aimed at deterring the fishers. One such measure involves the operation of an automatic forfeiture regime whereby the detained vessel, gear and catch are forfeited to the Commonwealth. This regime operates in the absence of any judgement on the merits. This paper examines the details of the Australian legislation in addition to recent case law and concludes that the operation of the automatic forfeiture regime has the potential to upset the balance established in Article 73 of the 1982 United Nations Convention on the Law of the Sea.


2015 ◽  
Vol 31 (2) ◽  
pp. 389 ◽  
Author(s):  
Arinto Nurcahyono ◽  
Husni Syam ◽  
Yuhka Sundaya

Water is a basic need of human being, no one can live without water and ithas no substitution. Water is a a requirement of adequate living standard for the healthand well-being of all human being..The current problem is the availability of water infulfill the human need is decreased. On the one hand there is the view that water isa commodity while the other side said that water is a social good.. The right to waterimplies that everyone should have access to water without discrimination. The state’srole is indispensable when people are not in the same position in getting water, thedifferences position of people can occur not only a problem of economic inequality, butalso the specific natural conditions in a certain region. Such differences make some partsof society difficult to gain access to water, and in this situation, the presence of the stateis strong required.


Author(s):  
Mariateresa Garrido

To be a journalist in Venezuela is very dangerous. In the past decade, there has been an increase of attacks against media and their personnel. On the one hand, attacks against journalists include harassment (physical, digital, legal), illegal detentions, kidnapping, and assassination. On the other hand, digital media have experienced blockages (DNS), internet shutdowns and slow-downs, failures in the connection, and restrictions to access internet-based platforms and content. Since 2014, the situation is deteriorating and limitations to exercise the right to freedom of expression have increased. However, this issue remains understudied; hence, this chapter considers primary and secondary data to analyze the types of limitations experienced by Venezuelan digital journalists from 2014 to 2018, explains the effects of ambiguous regulations and the use of problematic interpretations, and describes the inadequacies of national policies to promote freedom of the press.


Nowadays networks are becoming credential due to its robustness, reliability and flexibility. It got evolved with the high latency networks comprises of several workstations. Many routed protocols like IP and IPv6 are responsible to transmit the data traffic across remote network. Another factor in allocating logical address is to identify the physical address of the host in the local network. It is mandatory to allocate the IP address to transmit the data in the network. This cause the intruders to trespass into the network. They are classified as many types but we are dealing with spoofers. Our intention is to identify the spoofer’s location and to eradicate them by using overlay network. In this paper, we will discuss about the existing works and our proposed method.


2003 ◽  
Vol 97 (3) ◽  
pp. 585-590 ◽  
Author(s):  
Richard N. Gardner

Relations between the United States and most other countries, including major U.S. allies, have been severely strained during the past year by divergent opinions about the rules of international law governing the use of armed force. On the one side, the Bush administration has unveiled a new strategic doctrine asserting the right to use force preemptively against any country or terrorist group that could potentially threaten U.S. security. On the other side, most UN members have rejected the Bush doctrine as inconsistent with the traditional view that armed force can only be used when authorized by the Security Council or in self-defense against an armed attack. I will argue that neither the new Bush doctrine nor the strict interpretation of the “jurisprudes” represents good law or good policy. The new strategic environment, marked by suicidal terrorists and the spread of mass destruction weapons, requires a different approach.


1995 ◽  
Vol 38 (5-6) ◽  
Author(s):  
A. Tertulliani ◽  
F. Riguzzi

We have studied the seismic response of the city of Rome using the available macroseismic data of local earthquakes which occurred during the past one hundred years. These earthquakes were generated by three dislinct seismogenic sources falling within the present extent of Rome. The comparison with the effect produced in Rome by a large Apennine earthquake (January 13. 1915) suggests that the damage patterns are similar and that they are mainly controlled by the local geology and morphology. The analysis shows that most of the damage was concentrated in buildings located on alluvial deposits of the Tiber River rather than in buildings underlain by different lithologies. In addition, the largest concentration of heavy darnage occurred in buildings located on the alluvial deposits of the right-hand side of the Tiber River valley, and particularly where the buried interface between Holocene and Pliocene deposits is steepest. This close relationship between damage pattern on the one hand, and geology and geometry of the shallowest deposits on the other hand, supports the results of ground motion modeling studies of the same area and similar observations collected in different regions of the world during large earthquakes.


Author(s):  
G. N. Andreeva

The constitutions of the majority of the existing states reflect a negative attitude towards secession: from the establishment of a number of constitutional principles (the unity of the nation, the integrity of the state, etc.), which are interpreted by the bodies of constitutional control as directly or indirectly hindering the implementation of secession, to its direct prohibition. Only a small group of constitutions contain provisions allowing secession. Along with this, in the international legal field, wherein the states operate and declare the recognition of the principles thereof, there is a principle of recognition of the right of nations to self-determination. Within the framework of national law the secession, which was a precondition for the existence of the significant number of the contemporary states and, as such, served as the basis for the proclamation and approval of their independence, is considered at the official level as an important and significant event. It is celebrated as official holidays, anniversaries of independence, also states may support customs and traditions that are associated with the secession. The article shows that this “double standards”, applied by a significant part of modern states to past and future secessions is caused by, on the one hand, state obvious interest to preserve integrity, and, on the other hand, the traditions rooted in the past. The doctrine that justifies the strictly negative state attitude towards secession is not ideal, contradictory, based on the currently transforming concepts and theories; thus counter-arguments were developed based on fundamental constitutional theories and research. The diversity and inconsistency of the doctrine forces the contemporary state to either seek a balance between conflicting theories and approaches, or to adhere to one of them — usually not the most actual one. The necessary combination, synchronization of international legal and constitutional legal attitudes towards the regulation of secession can be ensured, first of all, if such regulation is based on the principle of the priority of human rights. At the same time, in contrast to the principle of the sovereign right to dispose of their territories by the states based on the model of property rights, which has feudal roots (which is also being modernized and transformed in the context of globalization), the humanitarian approach to ensure the right of people to self-determination is designed to guarantee the possibility of a free and rational choice of the form of their state existence by regional and local communities.


1960 ◽  
Vol 13 (1) ◽  
pp. 26-46
Author(s):  
Roar Skovmand

Grundtvig and the men of the first folk high school. By Roar Skovmand. Grundtvig not only originated the idea behind the folk high-school, but, from the very beginning, followed the realization of the idea with great attention. When, in 1844, the founding of the first folk high-school at Rødding in South Jutland was decided upon, Grundtvig welcomed the school in a great speech delivered at a public meeting - till then the largest held in Denmark – at Skamlingsbanken. He admitted, it is true, that he had in mind something different, - a State high-school at Sorø that would gather together youth from all sections of the nation; but he regarded the new school, the primary task of which was to safeguard Danish civilization against the encroachments of the German neighbour, as a “giant stride” in the right direction, and he promised to follow and support the work of this school. However, he found it difficult to keep his promise. Travel conditions in those days meant that Rødding was so far from Copenhagen that Grundtvig, though he received many invitations, never visited it, just as, indeed, he failed to visit other high-schools situated beyond the area of the capital. Nevertheless, there was a constant connection between Grundtvig and the men of the first folk high-school. The founder of the school, Professor Christian Flor, was one of Grundtvig’s most independent and most considerable disciples. In the spirit of Grundtvig, he stressed at the Rødding school the importance of history and literature, neglecting subjects of practical, technical value. There was, however, no close personal contact between Flor and Grundtvig. Flor once characterized Grundtvig as the monumental figure that indicated the goal and the way to it. Of the principals and teachers that had led the school in the period prior to 1864, three were closely associated with Grundtvig: Sofus Høgsbro, principal from 1850- 62, was a personal friend of Grundtvig’s eldest sons and a frequent guest in his home. He was not only an independent disciple of Grundtvig, but a man of stubborn character who did not deter from contradicting the old man when he was too one-sided, and he succeeded in influencing him politically towards radicalism. In ecclesiastical matters he agreed with Grundtvig, without sharing his religious conceptions. Although Grundtvig, in a sense, ranked him higher as a politician than as a high-school man, he supported Høgsbro in his controversy at the school with Edv. Thomsen, the natural science teacher, who wanted the school to cater to the technical needs of prospective farmers. During this conflict Grundtvig consented to join a triumvirate which was to appoint persons for the leadership of the school. Unlike Høgsbro his other fellow-teacher, Jens Lassen Knudsen, the father of Jakob Knudsen, the writer, maintained that the school should be a Grundtvigian school aiming at rousing young people, spiritually and intellectually, - like Christen Kold’s high-school on the island of Funen. Høgsbro would not agree to this, and this second conflict at Rødding did not end until Ludvig Schrøder, a young theologian, became leader of the school in 1862. He was as much impressed by Grundtvig’s Christian and liberal adult educational ideas as Knudsen was, and was at first so strongly influenced by them that even Grundtvig became anxious about his eagerness; but Schrøder proved wise enough to strike a balance between the traditions from the school of Flor and Høgsbro and the one-sided ideals set up by Knudsen and Kold. When the Germans had conquered South-Jutland in 1864 and the Røddingteachers moved to Askov, north of the new border, Schrøder called his new school »Flors High-School«, but the Grundtvigian impress it bore was so strong that it became the centre of the Grundtvigian high-school in Denmark. Grundtvig’s relation to the Danish folk high-school was never closer than this school was to him.


Sign in / Sign up

Export Citation Format

Share Document