An Enhanced FDPM Method for Network IP Attacks

International Journal of P2P Network Trends and Technology (IJPTT)          
© 2011 by IJPTT Journal
Volume-1 Issue-3                           
Year of Publication : 2011
Authors : S.Gavaskar, Dr.E.Ramaraj


S.Gavaskar, Dr.E.Ramaraj."An Enhanced FDPM Method for Network IP Attacks". International Journal of P2P Network Trends and Technology (IJPTT), V1(3):12-17  Nov - Dec 2011, ISSN:2249-2615, Published by Seventh Sense Research Group.


Internet Protocol trace back is the technology to control Internet frauds.Currently a large number of DistributedDenial of Service attack incidents make people aware ofthe importance of the IP trace back technique. IP trace back is theability to trace the IP packets to their origins. It provides asecurity system with the ability to find the original sources of theattacking IP packets. IP trace back mechanisms have beenresearched for years, aiming at finding the sources of IP packetsquickly and precisely. In this paper, we discuss and practical IP trace back system called Flexible Deterministic Packet Marking which provides a defense system for IP packets and denial service attacks that traverse through the network.


[1] K. Ramakrishnan, S. Floyd, and D. Black, “The addition of explicit congestion notification (ECN) to IP,” IETF, RFC 3168, Sept. 2001.
[2] M. Adler, J.-Y. Cai, J. K. Shapiro, and D. Towsley, “Estimation of congestion price using probabilistic packet marking,” in Proc. IEEE INFOCOM, 2003, pp. 2068–2078.
[3] S. Athuraliya, V. H. Li, S. H. Low, and Q. Yin, “REM: active queue management,” IEEE Network, vol. 15, pp. 48–53, May/June 2001.
[4] N. G. Duffield and M. Grossglauser, "Trajectory sampling for direct traffic observation", ACM SIGCOMM 2000, pp.271- 282.