Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Role of Probabilistic Packet Marking Mechanism in Large Scale IP Trace Backs


Affiliations
1 CSE Dept, Sri Indu College of Engg & Tech, Hyd, India
2 Sri Indu College of Engg & Tech , Hyd, India
3 Sri Indu College of Engg & Tech, Hyd, India
     

   Subscribe/Renew Journal


An approach to IP trace back based on the probabilistic packet marking paradigm has been explained in this paper. Our approach, which we call randomize and link uses large checksum cords to link messages fragments in a way that is highly scalable, for the checksums serve both as associative addresses and data integrity verifiers. The main advantage of these checksum cords is that they spread the addresses of possible router messages across a spectrum that is too large for the attacker to easily create messages that collide with legitimate messages.


Keywords

Associate Addresses, Checksum Cords, Distributed Denial of Services (DDOS), IP, IP Spoofing, Probabilistic Packet Marking, Trace Back.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 144

PDF Views: 5




  • Role of Probabilistic Packet Marking Mechanism in Large Scale IP Trace Backs

Abstract Views: 144  |  PDF Views: 5

Authors

K. Venkatesh Sharma
CSE Dept, Sri Indu College of Engg & Tech, Hyd, India
A. Lakshmi Kanth
Sri Indu College of Engg & Tech , Hyd, India
M. Dheeraj
Sri Indu College of Engg & Tech, Hyd, India

Abstract


An approach to IP trace back based on the probabilistic packet marking paradigm has been explained in this paper. Our approach, which we call randomize and link uses large checksum cords to link messages fragments in a way that is highly scalable, for the checksums serve both as associative addresses and data integrity verifiers. The main advantage of these checksum cords is that they spread the addresses of possible router messages across a spectrum that is too large for the attacker to easily create messages that collide with legitimate messages.


Keywords


Associate Addresses, Checksum Cords, Distributed Denial of Services (DDOS), IP, IP Spoofing, Probabilistic Packet Marking, Trace Back.