Detection of Spoofing Using Packet Marking Algorithm

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2014 by IJCTT Journal
Volume-10 Number-5
Year of Publication : 2014
Authors : B.Balasankari , M.G. MathanKumar
DOI :  10.14445/22312803/IJCTT-V10P145

MLA

B.Balasankari , M.G. MathanKumar. "Detection of Spoofing Using Packet Marking Algorithm". International Journal of Computer Trends and Technology (IJCTT) V10(5):253-256 Apr 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. However the localization infrastructure can be subjected to non cryptographic attacks, such as signal attenuation and amplification that cannot be addressed by traditional security services. An interruption in an authorized users access to a computer network, typically one caused with malicious intent (DDOS). Although the means to carry out motives for and targets of a DOS attack may vary, it generally consists of efforts to indefinitely interrupt services of a host connected to the Internet (DDOS). EPPM significantly reduces the number of IP (Internet protocol) or IP packets required to convey the relevant information, when compared to the prior best known scheme. Compared with the hash-based approach, our approach incurs less storage overhead and less access time overhead at routers. Specifically, the storage overhead is reduced to roughly one half, and the access time requirement is decreased by a factor of the number of neighbour routers.

References
[1]. J. Mirkovic, G. Prier, and P. Reiher, “Attacking DDOS at the source,” in Proceedings of the IEEE International Conference on Network Protocols, pp. 312-321, Nov. 2002.
[2] K. Park and H. Lee, “On the effectiveness of route- based packet filtering for distributed Denial of service attack (DDOS) prevention in power-law internets,” in Proceedings of ACM SIGCOMM’01, Aug. 2001.
[3] T. Peng, C. Leckie, and K. Ramamohanarao, “Adjusted probabilistic packet marking for IP trace- back,” in Networking 2002, pp. 697-708, May 2002.
[4] J.Ioannidis and S. M. Bellovin, “Implementing push- back: router-based defense against DDOS attacks,” in Proceedings of the Network and Distributed System Security Symposium (NDSS’02), pp. 6-8, Feb. 2002.
[5] H. Burch and B, Cheswick, “Tracing anonymous packets to their approximate source,” in Proceedings of the 14th Systems Administration Conference (LISA’00), pp. 319-327, Dec. 2000.
[6]. T. Peng, C. Leckie, and K. Ramamohanarao, “Adjusted probabilistic packet marking for IP trace- back,” in Networking 2002, pp. 697-708, May 2002.
[7] An effective prevention of attacks using gi Time frequency algorithm under DDOS attack by Dr.K.Kuppusamy, S.Malathi, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
[8] Exploiting P2P Systems for DDOS Attacks by Naoum Naoumov and Keith Ross, Department of Computer and Information Science Polytechnic University, Brooklyn, NY 11201.
[9] Trends in Denial of Service Attack Technology CERT® Coordination Center Kevin J. Houle, CERT/CC George M. Weaver, CERT/CC In collaboration with: Neil Long Rob Thomas v1.0 - October 2001.
[10] K. Park and H. Lee. On the effectiveness of route based packet filtering for distributed DOS prevention in power-law internets. In Proc.ACM SIGCOMM, San Diego, CA, August 2001.

Keywords
Network Analysis, Spoofing attack detection EPPM, Attack detection, Localization