Passive IP Traceback: Tracing spoofer IP and Blocking IP spoofer from Data access using Greedy Algorithm
International Journal of Emerging Trends in Science and Technology,
Vol. 3 No. 06 (2016),
1 June 2016
,
Page 4119-4131
Abstract
IP traceback can be used to find the origin of anonymous traffic; however, Internet-scale IP traceback
systems have not been deployed due to a need for cooperation between Internet Service Providers (ISPs).
This article presents an Internet-scale Passive IP Trackback (PIT) mechanism that does not require ISP
deployment. PIT analyzes the ICMP messages that may scattered to a network telescope as spoofed packets
travel from attacker to victim. An Internet route model is then used to help re-construct the attack path.
Applying this mechanism to data collected by Cooperative Association for Internet Data Analysis (CAIDA),
we found PIT can construct a trace tree from at least one intermediate router in 55.4% the fiercest packet
spoofing attacks, and can construct a tree from at least 10 routers in 23.4% of attacks. This initial result
shows PIT is a promising mechanism.
Categories and Subject Descriptors: C.2.0 [Computer Communication Networks]: General– Security and
protection.
How to Cite
Download Citation
References
- Article Viewed: 86 Total Download