Analysis of Different IP Traceback Techniques

Aman Sachdeva, World College of Technology & Management, Gurgaon, India; Mr. Binayak Parashar ,World College of Technology & Management, Gurgaon

DDoS attack, Types of DDoS attack, IP Traceback techniques, link testing, PPM, DPM

Internet usage is increasing day by day as well as the attacks on the sites. Distributed denial of service (DDoS) is one of the such type of attacks. DDoS disable the server by flooding invalid requests with invalid or spoofed addresses, due to this the server’s buffer gets overloaded and bandwidth of server get exhausted and server stop its services. Left undetected, can be very dangerous to the entire network. If organizations can detect these types of attack in advance then organizations will be saved from loss of these attacks, there is much prevention techniques which can detect these types of attack but while choosing one of these technique questions arise which technique should be used? Which is the best? IP Traceback technique is a DDoS detection technique, which is used to trace the path of an IP packet to its origin so one can find out the true identity of the attacker and can detect the path characteristics. Different types of IP Traceback Techniques are available. In this paper we study different IP Traceback techniques.
    [1] J. Mirkovic, and P. Reiher, “A Taxonomy of DDoS Attack and DDoS defense Mechanisms,” ACM SIGCOMM Computer Communications Review, Volume 34, Number 2, April 2004. [2] ISC Domain Survey jan 2016” https://www.isc.org/network/survey/” [3] K. Kumar, R.C. Joshi and K. Singh, “An Integrated Approach for Defending against Distributed Denial-of-Service (DDoS) Attacks”, iriss, 2006, IIT Madras. [4] G.Florance, “Survey of IP Traceback Methods in Distributed Denial of Service (DDoS) Attacks International Journal of Innovative Research in Science, Engineering and Technology, Vol. 4, Issue 7, July 2015. [5] Barry M. Leiner, Vinton G. Cerf, David D. Clark, Robert E. Kahn, Leonard Kleinrock, Daniel C. Lynch, Jon Postel, Larry G. Roberts, Stephen Wolff. A Brief History of the Internet. Internet Society. http://www.isoc.org. [6] Stephen M. Specht, and Ruby B. Lee, “Distributed Denial of Service:Taxonomies of Attacks, Tools andCountermeasures”Avilableat: http://palms.ee.princeton.edu/PALMSopen/DDoS%20Final%20PDCS%20Paper.pdf. [7] Felix Lau, Stuart H. Rubin, Michael H. Smith Ljiljana Trajkovic, “Distributed Denial of Service Attacks”Avilableat:http://www2.ensc.sfu.ca/~ljilja/ENSC833/Spring01/Assignments/smc00_edited.pdf [8] Christos Douligeris *, Aikaterini Mitrokotsa, “DDoS attacks and defense mechanisms: classification and state-of-the-art”Avilable at: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.103.7118&rep=rep1&type=pdf [9] Vijayalakshmi Murugesan, Mercy Shalinie, and Nithya Neethimani, “A Brief Survey of IP Traceback Methodologies”, Department of Computer Science and Engineering, Thigarajar College of Engineering, Thiruparankundram, Madurai – 625015, Tamilnadu, India [10] Christos Douligeris *, Aikaterini Mitrokotsa, “DDoS attacks and defense mechanisms: classification and state-of-the-art”, Department of Informatics, University of Piraeus, 80 Karaoli and Dimitriou Str, Piraeus 18534, Greece October 2003 [11] S. Savage, D. Wetherall, A. Karlin, and T. Anderson, “Practical network support for ip traceback,” in Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, ser. SIGCOMM ’00. New York, NY, USA: ACM, 2000, pp [12] B.B gupta ,R. C. Joshi and Manoj Misra, Member, IEEE”Disrtibuted Denial of Service Prevention Technique” International Journal of Computer and Electrical Engineering, Vol. 2, No. 2, April, 2010 1793-8163. [13] Darshan Lal Meena, Dr. R. S. Jadon” Distributed Denial of Service Attacks and Their Suggested Defense Remedial Approaches International Journal of Advance Research in Computer Science and Management Studies, Volume 2, Issue 4, April 2014.
Paper ID: GRDJEV01I080024
Published in: Volume : 1, Issue : 8
Publication Date: 2016-08-01
Page(s): 19 - 25