Identifying the Attack Source by IP Traceback

3Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The common attacks on the internet are denial of service and spoofing. Spoofing hides the identity of the attacker by modifying source IP address field and can cause the denial of service which makes the services unavailable to the legitimate users. Tracing the source of the attacking packet is very difficult because of stateless and destination based routing infrastructure of Internet. In this paper we propose a system which uses packet marking mechanisms along with Intrusion Prevention Systems for efficient IP traceback. The data mining techniques can be applied to the data collected from the packet marking scheme for detecting attack. The resultant database of knowledge can be further used by network Intrusion prevention systems for decision making. The data mining techniques are providing very efficient way for discovering useful knowledge from the available information. The combination of packet marking scheme, Intrusion prevention system and data mining can give us very effective results. © Springer-Verlag Berlin Heidelberg 2010.

Cite

CITATION STYLE

APA

Nalavade, K. C., & Meshram, B. B. (2010). Identifying the Attack Source by IP Traceback. In Communications in Computer and Information Science (Vol. 101, pp. 292–296). https://doi.org/10.1007/978-3-642-15766-0_42

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free