An IP traceback model for network forensics

4Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Network forensics deals with capture, recording, analysis and investigation of network traffic to traceback the attackers. Its ultimate goal is to provide sufficient evidence to allow the perpetrator to be prosecuted. IP traceback is an important aspect in the investigation process where the real attacker is identified by tracking source address of the attack packets. In this paper we classify the various approaches to network forensics to list the requirements of the traceback. We propose a novel model for traceback based on autonomous systems (AS) and deterministic packet marking (DPM) to enable traceback even with a single packet. The model is analyzed against various evaluation metrics. The traceback solution will be a major step in the direction of attack attribution and investigation. © Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2011.

Cite

CITATION STYLE

APA

Pilli, E. S., Joshi, R. C., & Niyogi, R. (2011). An IP traceback model for network forensics. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 53, pp. 129–136). https://doi.org/10.1007/978-3-642-19513-6_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free