##plugins.themes.academic_pro.article.main##

Abstract

IP traceback can be used to find the origin of anonymous traffic; however, Internet-scale IP traceback
systems have not been deployed due to a need for cooperation between Internet Service Providers (ISPs).
This article presents an Internet-scale Passive IP Trackback (PIT) mechanism that does not require ISP
deployment. PIT analyzes the ICMP messages that may scattered to a network telescope as spoofed packets
travel from attacker to victim. An Internet route model is then used to help re-construct the attack path.
Applying this mechanism to data collected by Cooperative Association for Internet Data Analysis (CAIDA),
we found PIT can construct a trace tree from at least one intermediate router in 55.4% the fiercest packet
spoofing attacks, and can construct a tree from at least 10 routers in 23.4% of attacks. This initial result
shows PIT is a promising mechanism.
Categories and Subject Descriptors: C.2.0 [Computer Communication Networks]: General– Security and
protection.

##plugins.themes.academic_pro.article.details##

How to Cite
Mrs KarpagaPriya.P1 , Mrs Selvi.U. (2016). Passive IP Traceback: Tracing spoofer IP and Blocking IP spoofer from Data access using Greedy Algorithm. International Journal of Emerging Trends in Science and Technology, 3(06), 4119-4131. Retrieved from http://igmpublication.org/ijetst.in/index.php/ijetst/article/view/1112