A Novel Hybrid Technique for Internet Protocol Traceback

G. Veera Swamy, A. Arun

Abstract


In addition, to we use a packet’s reference field to sensor attack traffic on its upstream routers. Lastly, we reproduce and analyze our proposal, in comparison with some other related investigation,in the aspects of: storage requirement, computation, and accuracy.

Keywords


Trace back IP; CAIDA ; IP Spoofing; Path reconstruction; Dos Attacks; Router Interface

Full Text:

PDF




Copyright (c) 2015 G. Veera Swamy, A. Arun

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org