Closing the Location of IP Spoofers Using Greedy Algorithm

Abstract

Network Security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs. The system implementation mainly focusing disclosing the Locations of IP Spoofers from Path Backscatter using the passive IP trace back (PIT) that bypasses the deployment difficulties of IP trace back techniques. PIT investigates Internet Control Message Protocol error messages (named path backscatter) triggered by spoofing traffic, and tracks the spoofer’s based on public available information (e.g., topology). In this way, PIT can find the spoofer’s without any deployment requirement. This paper illustrates the causes, collection, and the statistical results on path backscatter, demonstrates the processes and effectiveness of PIT, and shows the captured locations of spoofer’s through applying PIT on the path backscatter data set. These results can help further reveal IP spoofing, which has been studied for long but never well understood. Though PIT cannot work in all the spoofing attacks, it may be the most useful mechanism to trace spoofers before an Internet-level trace back system has been deployed in real. Instead of proposing another IP trace back mechanism with improved tracking capability, we propose a solution algorithm, named Greedy algorithm to bypass the challenges in deployment. Routers may fail to forward an IP spoofing packet due to various reasons,exceeding. In such cases, the routers may generate an ICMP error message and send the message to the spoofed source address. Because the routers can be close to the spoofers, the path backscatter messages may potentially disclose the locations of the spoofers. Greedy Algorithm exploits these path backscatter messages to find the location of the spoofers. With the locations of the spoofers known, the victim can seek help from the corresponding ISP to filter out the attacking packets, or take other counterattacks. PIT is especially useful for the victims in reflection based spoofing attacks, e.g., DNS amplification attacks. The victims can find the locations of the spoofers directly from the attacking traffic.

Authors and Affiliations

S. Srithar, Deepthi C J, R Dinesh Kumar, S. Jeevarekha, Sneha Varghese

Keywords

Related Articles

slugEconomic load dispatch problem using Heuristic gravitational search algorithm

This paper describes gravitational search algorithm for solving the non convex Economic load Dispatch (ELD) problem. The main objective of economic load dispatch problem is to generate the required amount of power so th...

An Approach to Analyse Digital Mammogram Using Statistical Parameters

Mammography is one of the available method for early detection of suspicious masses, related to breast cancer. Analysis of different statistical features of mammograms can provide clues about the presence of early signs...

A Survey on PAPR Reduction Methods for OFDM System

Orthogonal Frequency Division Multiplexing (OFDM) which falls under the multi carrier modulation category. OFDM has gain popularity in number of applications in wireless networks. A very desirable factor in most applica...

Energy Efficient Synchronization Scheme Using Heterogeneity with Mobile Sink in WSN

The energy of the sensor nodes in the Wireless Sensor Networks (WSNs) is a limited resource and causes the fluctuation in the lifetime of the network. Also, the throughput and delay of the network depend on how long the...

Effects of Compression Ratio on Performance combustion and emission of a Single Cylinder VCR Engine using Blends of Karanja Oil Methyl Ester with Diesel

Diesel engine plays an important role in the development of our country. Depletion of fossil fuel layer and pollution caused by the diesel engine is two major problem of the world today. In order to overcome the two pro...

Download PDF file
  • EP ID EP22571
  • DOI -
  • Views 227
  • Downloads 4

How To Cite

S. Srithar, Deepthi C J, R Dinesh Kumar, S. Jeevarekha, Sneha Varghese (2016). Closing the Location of IP Spoofers Using Greedy Algorithm. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(8), -. https://europub.co.uk./articles/-A-22571