Now days the Internet is exposed to a span of web threats, So the attack on its infrastructure poses a great challenge in its expansion. In the modern world various types of attacks are discovered on the Internet. IP spoofing is one of the major threats in the network security. Hackers use this to hide their identity or to perform an attack. IP spoofing used for many attacks like denial of service, SYN flooding and man in the middle attacks etc. It is necessary to capture or block the spoofers to defend against these attacks. Different IP trace back mechanisms are used for finding the spoofers identity. IP trace back scheme is a way used to catch the real path of web packets requiring a longer search so, a new hybrid IP trace back scheme is used with efficient packet logging aiming to have a fixed storage requirement for each router in packet logging without the need to refresh the logged tracking information and to achieve zero false positive and false negative rates in attack-path reconstruction. The hybrid IP trace back scheme compare with other related research in the aspects of storage requirement, computation, and accuracy. KeywordsNew hybrid IP trace back, CAIDA's , distributed denial of service attack ,packet logging, packet marking.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.