Efficient Flow Marking IP Traceback System
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 138 , Downloads: 101 | CTR: 73 % | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 2, February 2015

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

For controlling the offense on internet the Internet Protocol (IP) traceback technology is used. In this paper we represents a novel and practical IP trace back system, known as Efficient Flow Marking (EFM) for getting IP address of the attacker when IP spoofing technique is used by attacker. The services given by the resources to the justifiable clients Denial of service attack deny that services. The DOS Attacker uses IP spoofing technology for hiding their own uniqueness, for defending against the denial of service attack the first step is to find out IP address of the attacker to take further action. EFM is belongs from the packet marking family of IP trace back scheme. The new characteristics of EFM is that at first it can fix the length of marking field according to the network protocols set up (flexible mark length strategy), second, by observing the load of the participating router by a flexible flow based marking method the proposed method adaptively change its marking rate. This paper focuses on implementation of EFM on network processor.

Keywords: EFM, network processor, IP traceback, packet marking, DDoS, PPM, DPM

Edition: Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Share this Article

How to Cite this Article?

Sonali H. Mane, S. Pratap Singh, "Efficient Flow Marking IP Traceback System", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB151514, Volume 4 Issue 2, February 2015, 1809 - 1812

138 PDF Views | 101 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'EFM'

Views: 138 , Downloads: 101 | CTR: 73 % | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Views: 144 , Downloads: 112 | CTR: 78 % | Weekly Hits: ⮙5

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1343 - 1346

Role of Different Fuzzy Min- Max Neural Network for Pattern Classification

Jaitra Chakraborti

Share this Article

Similar Articles with Keyword 'network processor'

Views: 138 , Downloads: 101 | CTR: 73 % | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Views: 138 , Downloads: 126 | CTR: 91 % | Weekly Hits: ⮙5

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1568 - 1571

Design and Implementation of ADFM in Network Processor

Gayatri Ratilal Mali, N. P. Karlekar

Share this Article

Similar Articles with Keyword 'IP traceback'

Views: 138 , Downloads: 101 | CTR: 73 % | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Views: 128 , Downloads: 108 | CTR: 84 % | Weekly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1262 - 1265

A Survey on IP Traceback Mechanisms

Aparna C Bhadran, Maria Joy

Share this Article

Views: 121 , Downloads: 111 | CTR: 92 %

Informative Article, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 1013 - 1017

Reveal IP Spoofers Location from Route Backscatter and Passive IP Traceback

Akshay Dilip Homkar, S. D. Satav

Share this Article

Views: 144 , Downloads: 115 | CTR: 80 % | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1595 - 1601

Flexible Deterministic Packet Market: An IP Traceback Scheme

Pooja G. Kukreja, D.N.Rewadkar

Share this Article

Views: 150 , Downloads: 118 | CTR: 79 % | Weekly Hits: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 194 - 197

A Survey on Novel Flow Marking IP Traceback Schemes

S. M. Chaware, Shubhangi R. Sardar

Share this Article

Similar Articles with Keyword 'packet marking'

Views: 138 , Downloads: 101 | CTR: 73 % | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Views: 128 , Downloads: 108 | CTR: 84 % | Weekly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1262 - 1265

A Survey on IP Traceback Mechanisms

Aparna C Bhadran, Maria Joy

Share this Article

Views: 144 , Downloads: 115 | CTR: 80 % | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1595 - 1601

Flexible Deterministic Packet Market: An IP Traceback Scheme

Pooja G. Kukreja, D.N.Rewadkar

Share this Article

Views: 150 , Downloads: 118 | CTR: 79 % | Weekly Hits: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 194 - 197

A Survey on Novel Flow Marking IP Traceback Schemes

S. M. Chaware, Shubhangi R. Sardar

Share this Article

Views: 138 , Downloads: 126 | CTR: 91 % | Weekly Hits: ⮙5

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1568 - 1571

Design and Implementation of ADFM in Network Processor

Gayatri Ratilal Mali, N. P. Karlekar

Share this Article

Similar Articles with Keyword 'DDoS'

Views: 38 , Downloads: 31 | CTR: 82 % | Weekly Hits: ⮙13

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Views: 139 , Downloads: 99 | CTR: 71 % | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Views: 121 , Downloads: 99 | CTR: 82 % | Weekly Hits: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1612 - 1616

Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks

Vishal Mahale, Deepali Gothawal

Share this Article

Views: 138 , Downloads: 101 | CTR: 73 % | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Views: 129 , Downloads: 102 | CTR: 79 % | Weekly Hits: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

Share this Article

Similar Articles with Keyword 'PPM'

Views: 138 , Downloads: 101 | CTR: 73 % | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Views: 124 , Downloads: 112 | CTR: 90 % | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1694 - 1698

Privacy-Preserving in Data Mining using Anonymity Algorithm for Relational Data

Karan Dave, Chetna Chand

Share this Article

Views: 135 , Downloads: 116 | CTR: 86 % | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2262 - 2267

Accuracy-Constrained Privacy-Preserving Cell Level Access Control Mechanism for Relational Data

Madhuri S. Lambe, Vrunda K. Bhusari

Share this Article

Views: 151 , Downloads: 118 | CTR: 78 % | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 851 - 854

Facial Expression Recognition Using Fuzzy Logic

Sanjay Singh Pal, Muzammil Hasan

Share this Article

Views: 138 , Downloads: 126 | CTR: 91 % | Weekly Hits: ⮙5

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1568 - 1571

Design and Implementation of ADFM in Network Processor

Gayatri Ratilal Mali, N. P. Karlekar

Share this Article

Similar Articles with Keyword 'DPM'

Views: 138 , Downloads: 101 | CTR: 73 % | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Views: 144 , Downloads: 115 | CTR: 80 % | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1595 - 1601

Flexible Deterministic Packet Market: An IP Traceback Scheme

Pooja G. Kukreja, D.N.Rewadkar

Share this Article

Views: 138 , Downloads: 126 | CTR: 91 % | Weekly Hits: ⮙5

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1568 - 1571

Design and Implementation of ADFM in Network Processor

Gayatri Ratilal Mali, N. P. Karlekar

Share this Article
Top