A Marking Traceback System for Detecting the Source of Dos Ddos Attacks
Malliga Subramanian1, Kogilavani2, P.S.Nandhini3
1S. Malliga*, Professor, Department of Science and Engineering, Kongu Engineering College, Perundurai, Erode, (Tamil Nadu), India.
2S.V. Kogilavani, Associate Professor, Department of Science and Engineering, Kongu Engineering College, Perundurai, Erode, (Tamil Nadu), India.
3P.S.Nandhini, Assistant Professor, Department of Science and Engineering, Kongu Engineering College, Perundurai, Erode, (Tamil Nadu), India.
Manuscript received on November 20, 2019. | Revised Manuscript received on December 15, 2019. | Manuscript published on December 30, 2019. | PP: 874-878 | Volume-9 Issue-2, December, 2019. | Retrieval Number: A1638109119/2020©BEIESP | DOI: 10.35940/ijeat.A1638.129219
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Distributed Denial of Service (DDoS) attack is a significant threat in today’s world. Attackers hide their identity by spoofing and defending. To quickly detect a spoofed Internet Protocol (IP) during a DDoS attack the number of time-to-live hops in the network can be evaluated. While using time-to-live, if the routers gets compromised it may lead to the wrong detection of spoofed IP when both the source and attacker are at same distance. To identify an attacker, this system proposes an enhanced packet marking and traceback algorithm for IP traceback that helps the traceback of the spoofed packet to its source. A number of IP traceback techniques exist, but they have limitations like the number of packets required or storage and computational overheads incurred at routers. The technique proposed reduces marking and storage overhead.
Keywords: IP Spoofing, DoS, DDoS, IP Traceback, Packet Marking, Storage Overhead.