Preferences help
enabled [disable] Abstract
Number of results
2016 | 40 | 12-22
Article title

Survey of Several IP Traceback Mechanisms and Path Reconstruction

Title variants
Languages of publication
In real world the peoples having a lot of attacks troubles in the network. The unauthorized persons or hackers are use the another person’s IP address or use the attackers nearest IP address with in the area. If some kinds attacks such as DOS, DDOS attacks are create a lot of issues in network so difficult to find the spoofers or attackers. In this papper presents the Several IP Traceback Mechanism and Path Reconstruction.
Physical description
  • Department of CSE, Anna University Regional Centre, Tamil Nadu, India
  • PG Scholar, Department of CSE, Anna University Regional Centre, Tamil Nadu, India
  • PG Scholar, Department of CSE, Anna University Regional Centre, Tamil Nadu, India
  • [1] Sung M, Jun (Jim) Xu, Jun Li (2004). ‘Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Information-Theoretic Foundation‘, Vol. 7.
  • [2] Vahid A and Nur Zincir-Heywood A (2013). ‘On Evaluating IP Traceback Schemes: A Practical Perspective’, Vol. 8, No. 2.
  • [3] Savage S, David Wetherall, Anna K, and Tom Anderson (2001). ‘Network Support for IP Traceback‘, pp. 295-306.
  • [4] Savage S, David Wetherall, Anna Karlin and Tom Anderson (2000). ‘Practical Network Support for IP Traceback’, Vol. 29, No. 9.
  • [5] 3Cheng J, Haining, Kang G. Shine (2008). ’Hop Count Filtering: An Effective Defense Against Filtering Spoofed Traffic’. Vol. 9, No.1.
  • [6] Gong C and Kamil Sarac (2009). ‘IP Traceback based on Packet Marking and Logging‘, Vol. 9, No.6.
  • [7] Chen Z, Moon-Chuen Lee (2003). ‘An IP Traceback Technique against Denial-of-Service Attacks’, Vol. 40, No.10.
  • [8] H.C. Lee, V.L. Thing, Y. Xu and M. Ma (2003). ’Icmp Traceback with Cumulative Path Efficient Solution for Ip Traceback’ ,pp. 124-135.
  • [9] Guang Yao, Jun Bi Athanasios, V. Vasilakos (2015). Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter Vol 10,No 2.
  • [10] K. Jeeva, N. Duraipandian (2014). Hybrid IP Traceback Involving Path Reconstruction Using Qos. ISSN 1990-9233.
  • [11] Yaar, A. Perrig, and D. Song, “FIT: Fast internet traceback,” in Proc. IEEE 24th Annu. Joint Conf. IEEE Comput. Commun. Soc. (INFOCOM), vol. 2. Mar. 2005, pp. 1395-1406.
  • [12] C. Gong and K. Sarac, “A more practical approach for single-packet IP traceback using packet logging and marking,” IEEE Trans. Parallel Distrib. Syst., Vol. 19, no. 10, pp. 1310-1324, Oct. 2008.
  • [13] D. X. Song and A. Perrig, “Advanced and authenticated markingschemes for IP traceback,” in Proc. IEEE 20th Annu. Joint Conf. IEEE. Comput. Commun. Soc. (INFOCOM), Vol. 2. Apr. 2001, pp. 878-886.
Document Type
Publication order reference
YADDA identifier
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.