International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 135

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014


An IP Traceback using Packet Logging & Marking Schemes for Path Reconstruction

S. Malathi [2] | B. Naresh Achari [3] | S. Prathyusha [2]


Abstract: The Internet has been widely applied in various fields, network security issues emerge and catch peoples attention and then launch attacks. For this reason, developers have proposed a lot of traceback schemes to take out the source of these attacks. Some uses to combine packet marking with packet logging and therefore create hybrid IP trace back schemes. In packet logging no need to refresh the logged tracking information and to achieve zero false positive and false negative rates in attack-path reconstruction. In addition, we use a packets marking field to censor attack traffic on its upstream routers. Lastly, we create and analyze our scheme, in association with other related research, in the following aspects: storage requirement, computation, and accuracy. I


Keywords: DoS attack, IP traceback, IP spoofing, packet logging, packet marking


Edition: Volume 3 Issue 9, September 2014,


Pages: 1267 - 1271


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

S. Malathi, B. Naresh Achari, S. Prathyusha, "An IP Traceback using Packet Logging & Marking Schemes for Path Reconstruction", International Journal of Science and Research (IJSR), Volume 3 Issue 9, September 2014, pp. 1267-1271, https://www.ijsr.net/get_abstract.php?paper_id=SEP14405

Similar Articles with Keyword 'DoS attack'

Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024

Pages: 1755 - 1759

Enhancement in Homomorphic Encryption Scheme of Cloud Computing to Isolate DOS Attack

Jaspreet Kaur [15] | Dr. Gurjit Singh Bhathal [2]

Share this Article

Downloads: 100

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 878 - 881

Detection of Malicious Client based HTTP/DoS Attack on Web Server

Dhanya Jayan | Pretty Babu

Share this Article
Top