IP trace back techniques to ferret out denial of service attack source

  • Authors:
  • Adnan Aijaz;Syed Raza Mohsin;Mofassir-Ul-Haque Mofassir-Ul-Haque

  • Affiliations:
  • Electrical Engineering Department, National University of Sciences and Technology, Military College of Signals, Rawalpindi, Pakistan;Electrical Engineering Department, National University of Sciences and Technology, Military College of Signals, Rawalpindi, Pakistan;Electrical Engineering Department, National University of Sciences and Technology, Military College of Signals, Rawalpindi, Pakistan

  • Venue:
  • ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Today's life has been revolutionized by Internet. Future of Internet is even more promising because of emerging technologies like ubiquitous computing, context sensitive, adaptive and reconfigurable applications. Security is the most important issue concerned with Internet. Internet is exposed to threats like system penetration, financial fraud, theft of proprietary information, Denial of Service (DoS)/Distributed Denial of Service (DDoS) Attacks etc. Currently, DoS/DDoS attacks are the most expensive computer crimes. The attacker launching this type of attacks commonly masks his identity using IP spoofing. It is very difficult to identify the sources of a DoS/DDoS attack. IP trace back methods are used to locate the source of packet causing DoS/DDoS. In this paper we have carried out a survey of different existing trace back schemes highlighting their advantages and disadvantages. We also suggest our own hybrid IP traceback technique.