4.4 Article

An Effective Traceback Network Attack Procedure for Source Address Verification

Journal

WIRELESS PERSONAL COMMUNICATIONS
Volume 118, Issue 2, Pages 1675-1696

Publisher

SPRINGER
DOI: 10.1007/s11277-021-08110-1

Keywords

IP spoofing; Combined IP traceback procedure; Packet marking; Packet logging

Ask authors/readers for more resources

Internet Protocol Spoofing is considered the main threat for masquerade of the packet identity due to lack of source verification. This paper proposed a scheme using a Combined IP Traceback procedure to minimize computational and storage overhead, which efficiently marks packets using the 16-bit ID field and logs packets using a hash table. The path reconstruction is done by tracing back to the original source border router through the mark value in the packet, which has been empirically validated.
The Internet is being extensively used in various fields to serve billions of users, which leads to the number of network security issues. Here, Internet Protocol Spoofing is considered the main threat for masquerade of the packet identity. An IP packet, which contains the header with the source IP address, lacks source verification. The invaders to spoof the network address of the packet use this vulnerability. To overcome this, verification of source is performed by marking the packets and tracing back to the source. Existing schemes make use of either packet marking or packet logging for trace back to the source with high computational and storage overhead. This paper proposed a scheme to minimize both the overheads by using a Combined IP Traceback procedure. Packet marking is done efficiently by using the 16-bit ID field of the packet header and packet logging is completed more effectively by using the hash table. The path reconstruction is done using the mark value in the packet, which traces back to the original source border router. The proposed method is empirically validated against the related ones.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available