Skip to main content

Identifying the Attack Source by IP Traceback

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 101))

Abstract

The common attacks on the internet are denial of service and spoofing. Spoofing hides the identity of the attacker by modifying source IP address field and can cause the denial of service which makes the services unavailable to the legitimate users. Tracing the source of the attacking packet is very difficult because of stateless and destination based routing infrastructure of Internet. In this paper we propose a system which uses packet marking mechanisms along with Intrusion Prevention Systems for efficient IP traceback. The data mining techniques can be applied to the data collected from the packet marking scheme for detecting attack. The resultant database of knowledge can be further used by network Intrusion prevention systems for decision making. The data mining techniques are providing very efficient way for discovering useful knowledge from the available information. The combination of packet marking scheme, Intrusion prevention system and data mining can give us very effective results.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Nalavade, K.C., Meshram, B.B.: Intrusion Prevention System: Data Miniining Approach. In: International Conference and Workshop on Emerging Trends in Technology, Mumbai (2010)

    Google Scholar 

  2. Duan, Z., Yuan, X., Chandrashekhsr, J.: Controlling IP spoofing through Interdomain Packet Filters. IEEE Transactions on Dependable and secure computing 5(1) (January-March 2008)

    Google Scholar 

  3. Beverly, R., Bauer, S.: The spoofer project: Inferring the Extent of Internet Source Address Filtering on the Internet. In: Proc. First Usenix Steps to reducing Unwanted Traffic on he Internet Workshop (July 2005)

    Google Scholar 

  4. Hastings, N.E., McLean, P.A.: TCP /IP Spoofing Fundamentals. IEEE 3255-5 (1996)

    Google Scholar 

  5. Endorf, C., Schultz, E., Mellander, J.: Intrusion Detection and Prevention, Tata Mc-Graw Hill edn., ISBN 0-07-061606-X

    Google Scholar 

  6. Kim, Y., Lau, W.C., Chuah, M.C., Jonathan Chao, H.: PacketScore: A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks. IEEE Transactions on Dependable And Secure Computing 3(2) (April-June 2006)

    Google Scholar 

  7. Koller, R., Rangaswami, R., Marrero, J., Hernandez, I., Smith, G.: Anatomy of a Real-time Intrusion Prevention System. In: International Conference on Automonic Computing School of Computing and Information Sciences, Florida International University FL 33 (1996) 978-0-7695-3175-5

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nalavade, K.C., Meshram, B.B. (2010). Identifying the Attack Source by IP Traceback. In: Das, V.V., Vijaykumar, R. (eds) Information and Communication Technologies. ICT 2010. Communications in Computer and Information Science, vol 101. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15766-0_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15766-0_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15765-3

  • Online ISBN: 978-3-642-15766-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics