A Novel Hybrid Technique for Internet Protocol Traceback

G. Veera Swamy, A. Arun


In addition, to we use a packet’s reference field to sensor attack traffic on its upstream routers. Lastly, we reproduce and analyze our proposal, in comparison with some other related investigation,in the aspects of: storage requirement, computation, and accuracy.


Trace back IP; CAIDA ; IP Spoofing; Path reconstruction; Dos Attacks; Router Interface

Full Text:


Copyright (c) 2015 G. Veera Swamy, A. Arun

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 

Paper submission: ijr@pen2print.org