Research Article | Open Access | Download PDF
Volume 1 | Issue 3 | Year 2011 | Article Id. IJPTT-V1I3P404 | DOI : https://doi.org/10.14445/22492615/IJPTT-V1I3P404An Enhanced FDPM Method for Network IP Attacks
S.Gavaskar, Dr.E.Ramaraj
Citation :
S.Gavaskar, Dr.E.Ramaraj, "An Enhanced FDPM Method for Network IP Attacks," International Journal of P2P Network Trends and Technology (IJPTT), vol. 1, no. 3, pp. 12-17, 2011. Crossref, https://doi.org/10.14445/22492615/IJPTT-V1I3P404
Abstract
Internet Protocol trace back is the technology to
control Internet frauds.Currently a large number of DistributedDenial of
Service attack incidents make people aware ofthe importance of the IP trace
back technique. IP trace back is theability to trace the IP packets to their
origins. It provides asecurity system with the ability to find the original
sources of theattacking IP packets. IP trace back mechanisms have
beenresearched for years, aiming at finding the sources of IP packetsquickly
and precisely. In this paper, we discuss and practical IP trace back system
called Flexible Deterministic Packet Marking which provides a defense system
for IP packets and denial service attacks that traverse through the network.
Keywords
FDPM, IP, DDOS
References
[1] B. Al-Duwairi, and M. Govindarasu,
"Novel Hybrid Schemes Employing Packet
Marking and Logging for IP Traceback" ,
IEEE Transactions on Parallel and Distributed
Systems, V ol.17, No.5, 2006, pp.403-418.
[2] H. Aljifri, "IP Traceback: A New Denialof-Service Deterrent?", IEEE Security &
Privacy, Vol.1, No.3, 2003, pp.24-31.
[3] Y. Xiang, and W. Zhou, "An Active
Distributed Defense System to Protect Web
Applications from DDoS Attacks", Proc. of
the 6th International Conference on
Information Integration and Web Based
Application & Services (iiWAS2004).
[4] A. Belenky and N. Ansari, .On IP
traceback,. IEEE Communications Magazine,
vol. 41, no. 7, July 2003, to appear.
[5] H.-K. Ryu and S. Chong, “Deterministic
packet marking for max-min flow control,”
IEEE Commun. Lett., vol. 9, pp. 856–858,
Sept. 2005.
[6] R. W. Thommes and M. J. Coates,
“Deterministic packet marking for timevarying congestion price estimation,”
IEEE/ACM Trans. Networking, vol. 14, no. 3,
pp. 592–602, June 2006.
[7] K. Ramakrishnan, S. Floyd, and D. Black,
“The addition of explicit congestion
notification (ECN) to IP,” IETF, RFC 3168,
Sept. 2001.
[8] M. Adler, J.-Y. Cai, J. K. Shapiro, and D.
Towsley, “Estimation of congestion price
using probabilistic packet marking,” in Proc.
IEEE INFOCOM, 2003, pp. 2068–2078.
[9] S. Athuraliya, V. H. Li, S. H. Low, and Q.
Yin, “REM: active queue management,” IEEE
Network, vol. 15, pp. 48–53, May/June 2001.
[10] N. G. Duffield and M. Grossglauser,
"Trajectory sampling for direct traffic
observation", ACM SIGCOMM 2000, pp.271-
282.