International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 129

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015


Forensics Tracking for IP Spoofers Using Path Backscatter Messages

Mithun Dev P D | Anju Augustine [2]


Abstract: Attackers may use spoofed IP addresses to conceal their real locations. A number of different mechanisms are suggested to track the spoofers. However, due to the difficulties of implementation, there has been no commonly adopted IP traceback mechanism, at least at the Internet-level. Consequently, the mist on the places of spoofers has never been dissipated until now. This paper suggests a novel passive IP spoofer tracking mechanism that bypasses the implementation difficulties of IP traceback methods. This mechanism uses Internet Control Message Protocol error messages (named path backscatter) triggered by spoofing packets, and traces the spoofers depending on publicly available information (e. g. , topology). In this way, the mechanism can find the spoofers without any further deployment requirements. This work discusses the causes and collection of path backscatter messages. Furthermore, by employing the TTL field in IP packets, the geographical location details of routing device near to IP spoofers are found. Though the proposed scheme cannot work in all the spoofing attacks, it may be the most useful mechanism to trace spoofers before an Internet-level traceback system has been deployed in real.


Keywords: Network Security, IP traceback, Time to live, Denial of Service, IP spoofing


Edition: Volume 4 Issue 9, September 2015,


Pages: 570 - 574


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Mithun Dev P D, Anju Augustine, "Forensics Tracking for IP Spoofers Using Path Backscatter Messages", International Journal of Science and Research (IJSR), Volume 4 Issue 9, September 2015, pp. 570-574, https://www.ijsr.net/get_abstract.php?paper_id=SUB158081

Similar Articles with Keyword 'Network Security'

Downloads: 7 | Weekly Hits: ⮙7 | Monthly Hits: ⮙7

Review Papers, Computer Science & Engineering, India, Volume 13 Issue 3, March 2024

Pages: 882 - 886

Maximizing Cyber Security through Machine Learning and Data Analysis for Advanced Threat Detection and Mitigation

Manupreet Kaur

Share this Article

Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V | Sandhya V [4]

Share this Article
Top