700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ ReadersThis Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)
Research Article Open Access
It is long known attackers may use forged source IP address to conceal their real locations. To capture the spoofers, a number of IP traceback mechanisms have been proposed. However, due to the challenges of deployment, there has been not a widely adopted IP traceback solution, at least at the Internet level. The passive IP traceback (PIT) that bypasses the deployment difficulties of IP traceback techniques which identifies and deeply investigates path backscatter messages, these messages are valuable to understand spoofing activities. It specifies victims in reflection based spoofing attacks, the victims can find the locations of the spoofers directly from the attacking traffic. Through applying PIT on the path backscatter dataset, a number of locations of spoofers are captured and presented. PIT investigates Internet Control Message Protocol error messages (named path backscatter) triggered by spoofing traffic,and tracks the spoofers based on public available information. These results can help further reveal IP spoofing, which has been studied for long but never well understood.
To read the full article Peer-reviewed Article PDF
Author(s): Pooja P Vartika Sharma Syed Thouheed Ahmed
IP Traceback, Passive IP Traceback (PIT), IP Spoofers.