Flexible Deterministic Packet Market: An IP Traceback Scheme
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 115 | Monthly Hits: ⮙13

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015

Flexible Deterministic Packet Market: An IP Traceback Scheme

Pooja G. Kukreja, D.N.Rewadkar

Internet Protocol (IP) traceback is the enabling technology to control Internet crime. IP traceback system is called as Flexible Deterministic Packet Marking (FDPM) which provides a defense system with the ability to find out the real sources of attacking packets that traverse through the network. While a number of other traceback schemes exist, FDPM provides innovative features to trace the source of IP attack and can obtain better tracing capability than others. In this paper Any File is first divided into packets. Then all Packets are marked on marker side according to marking Scheme algorithm. Then there is a hacker who receives packet then he send it either normally or delete/alter some data in some packets then send further. Then there is one Reconstructor he only reconstruct the file. Finally receiver reconstructs the file and gets IP address of sender and hacker Using IP spoofing Technique, MAC address and Location of hacker also. So that he comes to Original file either hacked by anyone or not.

Keywords: DDos attacks, IP traceback, security, Flexible Deterministic Packet Marking

Edition: Volume 4 Issue 1, January 2015

Pages: 1595 - 1601

Share this Article

How to Cite this Article?

Pooja G. Kukreja, D.N.Rewadkar, "Flexible Deterministic Packet Market: An IP Traceback Scheme", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB15468, Volume 4 Issue 1, January 2015, 1595 - 1601

Enter Your Registered Email Address





Similar Articles with Keyword 'DDos attacks'

Downloads: 100 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Downloads: 101 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1612 - 1616

Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks

Vishal Mahale, Deepali Gothawal

Share this Article

Downloads: 103 | Weekly Hits: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1368 - 1371

Spam and Zombie Detection System with Machine Learned Spot Algorithm

Manishankar.S, Sobin E. S

Share this Article

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1747 - 1751

Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud

Aaqib Iqbal Wani, Janaki Raman V., N. Priya

Share this Article

Downloads: 107 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

Share this Article

Similar Articles with Keyword 'IP traceback'

Downloads: 102 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Downloads: 108 | Weekly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1262 - 1265

A Survey on IP Traceback Mechanisms

Aparna C Bhadran, Maria Joy

Share this Article

Downloads: 114 | Weekly Hits: ⮙2 | Monthly Hits: ⮙12

Informative Article, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 1013 - 1017

Reveal IP Spoofers Location from Route Backscatter and Passive IP Traceback

Akshay Dilip Homkar, S. D. Satav

Share this Article

Downloads: 115 | Monthly Hits: ⮙13

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1595 - 1601

Flexible Deterministic Packet Market: An IP Traceback Scheme

Pooja G. Kukreja, D.N.Rewadkar

Share this Article

Downloads: 119 | Weekly Hits: ⮙4 | Monthly Hits: ⮙13

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 194 - 197

A Survey on Novel Flow Marking IP Traceback Schemes

S. M. Chaware, Shubhangi R. Sardar

Share this Article

Similar Articles with Keyword 'security'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1237 - 1240

Women Safety Alert System Using Arduino

P. Jayalakshmi, Bejjanki Shashank, Kakumani Yasaswi

Share this Article

Downloads: 8 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 37 | Weekly Hits: ⮙2 | Monthly Hits: ⮙37

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Downloads: 40 | Weekly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 40

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Similar Articles with Keyword 'Flexible Deterministic Packet Marking'

Downloads: 115 | Monthly Hits: ⮙13

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1595 - 1601

Flexible Deterministic Packet Market: An IP Traceback Scheme

Pooja G. Kukreja, D.N.Rewadkar

Share this Article

Downloads: 127 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1568 - 1571

Design and Implementation of ADFM in Network Processor

Gayatri Ratilal Mali, N. P. Karlekar

Share this Article



Top