A Survey of Secure Network Infrastructure on Different IP Traceback Mechanism for Finding the Location of Spoofers  
  Authors : Rajratan Gawai; Varsha Bejgam; Madhuri Sawant; Sujitkumar Patole

 

It is long best-known attackers might use forged source internet protocol address to conceal their real locations. To capture the SPOOFERS, a variety of information processing TRACEBACK mechanisms have been projected. However, as a result of the challenges of preparation, there has been not a widely adopted information science TRACEBACK resolution, at least at the net level. As a result, the mist on the locations of SPOOFERS has never been dissipated until currently. This paper proposes (PIT) passive ip TRACEBACK that bypasses the deployment difficulties of information processing TRACEBACK techniques. PIT investigates net control Message Protocol error messages (named path backscatter) triggered by spoofing traffic, and tracks the SPOOFERS supported public available information (e.g., topology). in this way, PIT can find the SPOOFERS without any readying requirement. This paper illustrates the causes, collection, and the applied mathematics results on path disperse, demonstrates the processes and effectiveness of PIT, and shows the captured locations of SPOOFERS through applying PIT on the path scatter information set. These results will facilitate more reveal IP spoofing, that has been studied for long however ne'er well understood. though PIT cannot work in all the spoofing attacks, it may be the most useful mechanism to trace SPOOFERS before associate degree Internet-level TRACEBACK system has been deployed in real.

 

Published In : IJCAT Journal Volume 3, Issue 2

Date of Publication : February 2016

Pages : 107 - 114

Figures :04

Tables : 01

Publication Link :A Survey of Secure Network Infrastructure on Different IP Traceback Mechanism for Finding the Location of Spoofers

 

 

 

Rajratan Gawai : Computer Engineering, Savitribai Phule Pune University, P.G.M.C.O.E Pune, Maharashtra, India

Varsha Bejgam : Computer Engineering, Savitribai Phule Pune University, P.G.M.C.O.E Pune, Maharashtra, India

Madhuri Sawant : Computer Engineering, Savitribai Phule Pune University, P.G.M.C.O.E Pune, Maharashtra, India

Sujitkumar Patole : Computer Engineering, Savitribai Phule Pune University, P.G.M.C.O.E Pune, Maharashtra, India

 

 

 

 

 

 

 

Computer Network Management

Computer Network Security

Denial of Service (DoS)

IP TRACEBACK

We attempt to dissipate the mist on the locations of SPOOFERS based on investigation the path backscatter messages. In this article, we projected Passive ip TRACEBACK (PIT) which tracks SPOOFERS based on path backscatter messages and public available data. we illustrate causes, collection, and statistical results on path backscatter. we specified how to apply PIT once the topology and routing are both known, or the routing is unknown, or neither of them are known. We given two effective algorithms to apply PIT in large scale networks and proofed their correctness. we demonstrated the effectiveness of PIT primarily based on deduction and simulation. We showed the captured locations of SPOOFERS through applying PIT on the path backscatter dataset. These results can help further reveal ip spoofing, that has been studied for long but never well understood.

 

 

 

 

 

 

 

 

 

[1] S. M. Bellovin, “Security problems in the TCP/IP protocol suite,”ACM SIGCOMM Comput. Commun. Rev., vol. 19, no. 2, pp. 32–48,Apr. 1989. [2] ICANN Security and Stability Advisory Committee, “Distributed denial of service (DDOS) attacks,” SSAC, Tech. Rep. SSAC Advisory SAC008,Mar. 2006. [3] C. Labovitz, “Bots, DDoS and ground truth,” presented at the 50th NANOG, Oct. 2010. [4] The UCSD Network Telescope. [Online]. Available:http://www.caida.org/projects/network_teles cope/ [5] S. Savage, D. Wetherall, A. Karlin, and T. Anderson, “Practical network support for IP TRACEBACK,” in Proc. Conf. Appl., Technol., Archit.,Protocols Comput. Commun. (SIGCOMM), 2000, pp. 295–306. [6] S. Bellovin. ICMP TRACEBACK Messages. [Online]. Available:http://tools.ietf.org/html/draft-ietf-itrace-04, accessed Feb. 2003. [7] A.C. Snoeren et al., “Hash-based IP TRACEBACK,” SIGCOMM Comput. Commun. Rev., vol. 31, no. 4, pp. 3–14, Aug. 2001. [8] D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage,“Inferring internet denial-of-service activity,” ACM Trans. Comput. Syst., vol. 24, no. 2, pp. 115–139, May 2006. [Online]. Available: http://doi.acm.org/10.1145/1132026.1132027. [9] M. T. Goodrich, “Efficient packet marking for largescale IP TRACEBACK,”in Proc. 9th ACM Conf. Comput. Commun. Secur. (CCS), 2002, pp. 117–126. [10] D. X. Song and A. Perrig, “Advanced and authenticated marking schemes for IP TRACEBACK,” in Proc. IEEE 20th Annu. Joint Conf. IEEE Comput. Commun. Soc. (INFOCOM), vol. 2. Apr. 2001, pp. 878–886. [11] A.Yaar, A. Perrig, and D. Song, “FIT: Fast internet TRACEBACK,” in Proc. IEEE 24th Annu. Joint Conf. IEEE Comput. Commun. Soc. (INFOCOM), vol. 2. Mar. 2005, pp. 1395–1406. [12] J. Liu, Z.-J. Lee, and Y.-C. Chung, “Dynamic probabilistic packet marking for efficient IP TRACEBACK,” Comput. Netw., vol. 51, no. 3,pp. 866–882, 2007. [13] K. Park and H. Lee, “On the effectiveness of probabilistic packet marking for IP TRACEBACK under denial of service attack,” in Proc. IEEE 20th Annu. Joint Conf. IEEE Comput. Commun. Soc. (INFOCOM),vol. 1. Apr. 2001, pp. 338–347. [14] M. Adler, “Trade-offs in probabilistic packet marking for IP TRACEBACK,” J. ACM, vol. 52, no. 2, pp. 217–244, Mar. 2005. [15] A. Belenky and N. Ansari, “IP TRACEBACK with deterministic packet marking,” IEEE Commun. Lett., vol. 7, no. 4, pp. 162–164, Apr. 2003. [16] Y. Xiang, W. Zhou, and M. Guo, “Flexible deterministic packet marking: An IP TRACEBACK system to find the real source of attacks,” IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 4, pp. 567–580, Apr. 2009. [17] R. P. Laufer et al., “Towards stateless single-packet IP TRACEBACK,” in Proc. 32nd IEEE Conf. Local Comput. Netw. (LCN), Oct. 2007 I pp. 548– 555. [Online]. Available: http://dx.doi.org/10.1109/ LCN.2007.160 [18] M. D. D. Moreira, R. P. Laufer, N. C. Fernandes, and O. C. M. B. Duarte, “A stateless TRACEBACK technique for the origin of attacks from a single packet,” in Proc. IEEE Int Conf.Commun. (ICC), Jun. 2011, pp. 1–6.