Passive IP trace back using Border Gateway Protocol (BGP)

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Nowadays networks are becoming credential due to its robustness, reliability and flexibility. It got evolved with the high latency networks comprises of several workstations. Many routed protocols like IP and IPv6 are responsible to transmit the data traffic across remote network. Another factor in allocating logical address is to identify the physical address of the host in the local network. It is mandatory to allocate the IP address to transmit the data in the network. This cause the intruders to trespass into the network. They are classified as many types but we are dealing with spoofers. Our intention is to identify the spoofer’s location and to eradicate them by using overlay network. In this paper, we will discuss about the existing works and our proposed method.

Cite

CITATION STYLE

APA

Philomina, S., Jasmin, M., Sathya Narayan, R., & Balaji, S. (2019). Passive IP trace back using Border Gateway Protocol (BGP). International Journal of Innovative Technology and Exploring Engineering, 8(9 Special Issue 3), 1140–1144. https://doi.org/10.35940/ijitee.I3247.0789S319

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free