The common attacks on the internet are denial of service and spoofing. Spoofing hides the identity of the attacker by modifying source IP address field and can cause the denial of service which makes the services unavailable to the legitimate users. Tracing the source of the attacking packet is very difficult because of stateless and destination based routing infrastructure of Internet. In this paper we propose a system which uses packet marking mechanisms along with Intrusion Prevention Systems for efficient IP traceback. The data mining techniques can be applied to the data collected from the packet marking scheme for detecting attack. The resultant database of knowledge can be further used by network Intrusion prevention systems for decision making. The data mining techniques are providing very efficient way for discovering useful knowledge from the available information. The combination of packet marking scheme, Intrusion prevention system and data mining can give us very effective results. © Springer-Verlag Berlin Heidelberg 2010.
CITATION STYLE
Nalavade, K. C., & Meshram, B. B. (2010). Identifying the Attack Source by IP Traceback. In Communications in Computer and Information Science (Vol. 101, pp. 292–296). https://doi.org/10.1007/978-3-642-15766-0_42
Mendeley helps you to discover research relevant for your work.