A Novel Attack Path Reconstruction Based on Packet Logging & Marking Scheme
|S.Prathyusha1, M.V.Sruthi2 and S.Anjani Prasad3
|Related article at Pubmed, Scholar Google|
Computer network attacks are on the increase and are more sophisticated in today’s network environment than ever before. One step in tackling the increasing spate of attacks is the availability of a system that can trace attack packets back to their original sources irrespective of invalid or manipulated source addresses. Most of these schemes require very large number of packets to conduct the traceback process, which results in lengthy and complicated procedure. IP traceback is just the technique to realize the goal, it reconstructs IP packets traversed path in the Internet to determine their origins. To reconstruct the path of a packet and identify the source of the attack, the victim requires a map of the routers. The victim matches packet markings with the routers on the map and can thus reconstruct the attack path .There are two major kinds of IP traceback techniques, which have been proposed as packet marking and packet logging. Here in this paper we presented a novel attack path reconstruction based on packet logging and marking techniques which shows improved accuracy, practicality and low storage and number of routers.