M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015
Flexible Deterministic Packet Market: An IP Traceback Scheme
Pooja G. Kukreja, D.N.Rewadkar
Internet Protocol (IP) traceback is the enabling technology to control Internet crime. IP traceback system is called as Flexible Deterministic Packet Marking (FDPM) which provides a defense system with the ability to find out the real sources of attacking packets that traverse through the network. While a number of other traceback schemes exist, FDPM provides innovative features to trace the source of IP attack and can obtain better tracing capability than others. In this paper Any File is first divided into packets. Then all Packets are marked on marker side according to marking Scheme algorithm. Then there is a hacker who receives packet then he send it either normally or delete/alter some data in some packets then send further. Then there is one Reconstructor he only reconstruct the file. Finally receiver reconstructs the file and gets IP address of sender and hacker Using IP spoofing Technique, MAC address and Location of hacker also. So that he comes to Original file either hacked by anyone or not.
Keywords: DDos attacks, IP traceback, security, Flexible Deterministic Packet Marking
Edition: Volume 4 Issue 1, January 2015
Pages: 1595 - 1601
How to Cite this Article?
Pooja G. Kukreja, D.N.Rewadkar, "Flexible Deterministic Packet Market: An IP Traceback Scheme", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB15468, Volume 4 Issue 1, January 2015, 1595 - 1601
122 PDF Views | 99 PDF Downloads
Similar Articles with Keyword 'DDos attacks'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2832 - 2836Minimization of DDoS Attack using Firecol an Intrusion Prevention System
Bhagyashri Kotame, Shrinivas Sonkar
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1612 - 1616Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks
Vishal Mahale, Deepali Gothawal
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1368 - 1371Spam and Zombie Detection System with Machine Learned Spot Algorithm
Manishankar.S, Sobin E. S
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 511 - 516Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset
Swapnali G. Game, S. B. Natikar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1747 - 1751Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud
Aaqib Iqbal Wani, Janaki Raman V., N. Priya
Similar Articles with Keyword 'IP traceback'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1809 - 1812Efficient Flow Marking IP Traceback System
Sonali H. Mane, S. Pratap Singh
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1262 - 1265A Survey on IP Traceback Mechanisms
Aparna C Bhadran, Maria Joy
Informative Article, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017
Pages: 1013 - 1017Reveal IP Spoofers Location from Route Backscatter and Passive IP Traceback
Akshay Dilip Homkar, S. D. Satav
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1595 - 1601Flexible Deterministic Packet Market: An IP Traceback Scheme
Pooja G. Kukreja, D.N.Rewadkar
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 194 - 197A Survey on Novel Flow Marking IP Traceback Schemes
S. M. Chaware, Shubhangi R. Sardar
Similar Articles with Keyword 'security'
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 700 - 705Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects
Kale Jyoti S
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Similar Articles with Keyword 'Flexible Deterministic Packet Marking'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1595 - 1601Flexible Deterministic Packet Market: An IP Traceback Scheme
Pooja G. Kukreja, D.N.Rewadkar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1568 - 1571Design and Implementation of ADFM in Network Processor
Gayatri Ratilal Mali, N. P. Karlekar