International Journal of P2P
Network Trends and Technology

Research Article | Open Access | Download PDF
Volume 1 | Issue 3 | Year 2011 | Article Id. IJPTT-V1I3P404 | DOI : https://doi.org/10.14445/22492615/IJPTT-V1I3P404

An Enhanced FDPM Method for Network IP Attacks


S.Gavaskar, Dr.E.Ramaraj

Citation :

S.Gavaskar, Dr.E.Ramaraj, "An Enhanced FDPM Method for Network IP Attacks," International Journal of P2P Network Trends and Technology (IJPTT), vol. 1, no. 3, pp. 12-17, 2011. Crossref, https://doi.org/10.14445/22492615/IJPTT-V1I3P404

Abstract

Internet Protocol trace back is the technology to control Internet frauds.Currently a large number of DistributedDenial of Service attack incidents make people aware ofthe importance of the IP trace back technique. IP trace back is theability to trace the IP packets to their origins. It provides asecurity system with the ability to find the original sources of theattacking IP packets. IP trace back mechanisms have beenresearched for years, aiming at finding the sources of IP packetsquickly and precisely. In this paper, we discuss and practical IP trace back system called Flexible Deterministic Packet Marking which provides a defense system for IP packets and denial service attacks that traverse through the network.

Keywords

FDPM, IP, DDOS

References

[1] B. Al-Duwairi, and M. Govindarasu, "Novel Hybrid Schemes Employing Packet Marking and Logging for IP Traceback" , IEEE Transactions on Parallel and Distributed Systems, V ol.17, No.5, 2006, pp.403-418.
[2] H. Aljifri, "IP Traceback: A New Denialof-Service Deterrent?", IEEE Security & Privacy, Vol.1, No.3, 2003, pp.24-31.
[3] Y. Xiang, and W. Zhou, "An Active Distributed Defense System to Protect Web Applications from DDoS Attacks", Proc. of the 6th International Conference on Information Integration and Web Based Application & Services (iiWAS2004).
[4] A. Belenky and N. Ansari, .On IP traceback,. IEEE Communications Magazine, vol. 41, no. 7, July 2003, to appear.
[5] H.-K. Ryu and S. Chong, “Deterministic packet marking for max-min flow control,” IEEE Commun. Lett., vol. 9, pp. 856–858, Sept. 2005.
[6] R. W. Thommes and M. J. Coates, “Deterministic packet marking for timevarying congestion price estimation,” IEEE/ACM Trans. Networking, vol. 14, no. 3, pp. 592–602, June 2006.
[7] K. Ramakrishnan, S. Floyd, and D. Black, “The addition of explicit congestion notification (ECN) to IP,” IETF, RFC 3168, Sept. 2001.
[8] M. Adler, J.-Y. Cai, J. K. Shapiro, and D. Towsley, “Estimation of congestion price using probabilistic packet marking,” in Proc. IEEE INFOCOM, 2003, pp. 2068–2078.
[9] S. Athuraliya, V. H. Li, S. H. Low, and Q. Yin, “REM: active queue management,” IEEE Network, vol. 15, pp. 48–53, May/June 2001.
[10] N. G. Duffield and M. Grossglauser, "Trajectory sampling for direct traffic observation", ACM SIGCOMM 2000, pp.271- 282.