Closing the Location of IP Spoofers Using Greedy Algorithm
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 8
Abstract
Network Security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs. The system implementation mainly focusing disclosing the Locations of IP Spoofers from Path Backscatter using the passive IP trace back (PIT) that bypasses the deployment difficulties of IP trace back techniques. PIT investigates Internet Control Message Protocol error messages (named path backscatter) triggered by spoofing traffic, and tracks the spoofer’s based on public available information (e.g., topology). In this way, PIT can find the spoofer’s without any deployment requirement. This paper illustrates the causes, collection, and the statistical results on path backscatter, demonstrates the processes and effectiveness of PIT, and shows the captured locations of spoofer’s through applying PIT on the path backscatter data set. These results can help further reveal IP spoofing, which has been studied for long but never well understood. Though PIT cannot work in all the spoofing attacks, it may be the most useful mechanism to trace spoofers before an Internet-level trace back system has been deployed in real. Instead of proposing another IP trace back mechanism with improved tracking capability, we propose a solution algorithm, named Greedy algorithm to bypass the challenges in deployment. Routers may fail to forward an IP spoofing packet due to various reasons,exceeding. In such cases, the routers may generate an ICMP error message and send the message to the spoofed source address. Because the routers can be close to the spoofers, the path backscatter messages may potentially disclose the locations of the spoofers. Greedy Algorithm exploits these path backscatter messages to find the location of the spoofers. With the locations of the spoofers known, the victim can seek help from the corresponding ISP to filter out the attacking packets, or take other counterattacks. PIT is especially useful for the victims in reflection based spoofing attacks, e.g., DNS amplification attacks. The victims can find the locations of the spoofers directly from the attacking traffic.
Authors and Affiliations
S. Srithar, Deepthi C J, R Dinesh Kumar, S. Jeevarekha, Sneha Varghese
An Attack Resistant of Malicious Nodes for Securing Vehicular Adhoc Networks by an Encryption Alert
Vehicular Ad hoc Network (VANET) is an autonomous wireless network comprising of moving vehicles. A small communication unit is installed in the devices that are capable of transmitting its GPS (Global Positioning Syste...
Microstructure Analysis Of Cement Mortar On Partial Replacement Of Fine Aggregates By Industrial Wastes
The industrial wastes due to their high performance when blended with the building materials generated great interest in the field of structural engineering. Many industries are looking for the effective use of their in...
Autonomous Vehicle with Obstacle Avoidance and Tracking
In this paper we proposes a driverless vehicle that has an onboard GPS module which is capable of driving the vehicle from one point to another without human operator. This system makes use of an Embedded System based o...
Data Mining: Business Intelligence, Data Integration: Different Data Analysis Methods
Data analysis helps for obtaining raw data and converting it into information useful for decision-making by users. Data is collected and analyzed to answer questions, test hypotheses or disprove theories. There are diff...
Experimental Investigation of Heat Transfer in Heat Exchanger Using Different Geometry of Inserts
The investigation of heat transfer coefficient and friction factor in a single tube heat exchanger with different geometry of inserts has been presented experimentally. The experimentally obtained data for different cas...