|
IP Trace Back Scheme for Packet Marking and Packet Logging Using RIHTKeywords: DoS attack , DDoS attack , hybrid IP trace back , IP spoofing , packet logging , packet marking Abstract: Internet Protocol trace back is the enabling technology to control the crime. Internet Protocolpacket is to find the real source of Internet attacks, we must possess the capability of discovering the origin ofIP packets without relying on the source IP address field. This capability is called IP trace back. IP traceback systems provide a means to identify true sources of IP packets without relying on the source IP addressfield of the packet header, and are the major technique to find the real attack sources. In this project wepresent an IP trace back system called Deterministic Packet Marking and with packet logging whichprovides [1] a defense system with the ability to find out the real sources of attacking packets that traversethrough the network. While a number of other trace back schemes exist, we propose a new hybrid IP traceback scheme with efficient packet logging aiming to have a fixed storage requirement for each router inpacket logging without the need to refresh the logged tracking information and to achieve zero false positiveand false negative rates in attack-path reconstruction.
|