Conference Paper

Mobile Agents and Packet Marking for Real-Time IP Traceback

Univ. of Technol. Mauritius, Pointe-aux-Sables
DOI: 10.1109/ICDS.2009.11 Conference: Digital Society, 2009. ICDS '09. Third International Conference on
Source: IEEE Xplore


Internet and computer technology are increasingly being used as vehicles for an escalating variety of infringements. The most popular attack on the Internet being the Denial of Service (DoS) attack, there is growing need to be able to track the sources of the attacks. IP trace back schemes can be used for tracing the source of attacks. We propose a mechanism for IP trace back which is based on packet marking and mobile agents whereby routers mark the packets in flight with only 37 bits of data and mobile agents use this information to trace back the source of attack.

1 Follower
23 Reads
  • [Show abstract] [Hide abstract]
    ABSTRACT: Damage caused by illegal access to web sites is increasing with the growth of the Internet. In particular, denial of service (DoS) and distributed DoS (DDoS) attacks cause system downtime and often affect social life. To cope with these problems, the method known as “IP traceback using departure stamps” has been developed. Here, we propose three methods to improve traceability of this method and evaluate these methods through simulation.
    No preview · Article · Dec 2009
  • [Show abstract] [Hide abstract]
    ABSTRACT: Internet has always been vulnerable to a variety of security threats as it was originally designed without apprehending the prospect of security concerns. Modern era has seen diverse nature of attacks possible on the Internet, including the most perilous attack, Distributed Denial of Service (DDoS) attacks. In such an attack, a large number of compromised systems coordinate with each other so as to direct gigantic magnitude of attack traffic toward the victim, depleting its tangible and intangible network resources. To further exacerbate the situation, these compromised systems usually disguise their identity by capitalizing on IP address spoofing. IP traceback is the class of techniques used to identify the actual source of network packets. In this paper, we followed a systematic approach to comprehensively review and categorize 275 works representing existing IP traceback literature. The paper also provides an in-depth analysis of different IP traceback approaches, their functional classes and the evaluation metrics. Based on the literature review, we also answered a set of research questions to understand the current trends in IP traceback. Various issues, challenges and avenues for future research in the area of IP traceback are also discussed.
    No preview · Article · Jul 2015 · Computers & Security