A Secure Network Infrastructure for IP Spoofing Attack by Using IP Traceback

It is long known attackers may use fake source IP address to hide their real locations. To capture the spoofers, a number of IP traceback techniques have been proposed. However, due to the challenges of deployment, there has been not a broadly adopted IP traceback solution, at least at the Internet level. Therefore, the mist on the locations of spoofers has never been degenerated till now. Here the authors propose passive IP Traceback (PIT) that bypasses the deployment problems of IP traceback techniques. PIT explores Internet Control Message Protocol error messages (named path backscatter) generated by spoofing traffic and tracks the spoofers based on public available information (e.g., topology). Thus, PIT can discover the spoofers without any deployment requirement.

Provided by: International Journal of Advanced and Innovative Research (IJAIR) Topic: Networking Date Added: Dec 2015 Format: PDF

Find By Topic