Security

A Review of Packet Marking IP Traceback Schemes

Download Now Free registration required

Executive Summary

Today, Internet has become the primary source of communication in networks. The attack on its infrastructure poses a great challenge in its expansion. Distributed Denial of Service attack is a serious security threat encountered during the past decade. The goal of the attacker is to spoof the source of IP address to hide its source. Various IP traceback schemes such as probabilistic packet marking, deterministic packet marking, TTL base packet marking and hash base IP traceback schemes are proposed to trace the source of the attacker. This paper summarizes the different IP traceback techniques and compares their effectiveness in countering DDoS attack.

  • Format: PDF
  • Size: 529.19 KB