B.Suvarna Lakshmi, N Venkatadri


This paper demonstrates precisely why, collection, combined with the record results on path backscatter, demonstrates the processes and effectiveness of PIT, and shows the taken locations of spoofers through using PIT on the way backscatter data set. However, due to the challenges of deployment, there's not just a broadly adopted IP trace back solution, no under online level. Its extended known attackers could use forged source Ip to cover their real locations. To capture the spoofers, numerous IP trace back systems are actually recommended. Consequently, the mist over the locations of spoofers is not dissipated till now. This paper proposes passive IP trace back (PIT) that bypasses the deployment difficulties of IP trace back techniques. PIT checks Internet Control Message Protocol error messages (named path backscatter) triggered by spoofing traffic, and tracks the spoofers based on public available information (e.g., topology). In this way, PIT will identify the spoofers without any deployment requirement. Though PIT cannot are employed in most the spoofing attacks, it may be most likely probably most likely probably the most useful mechanism to look at spoofers before an online-based-level trace back system remains deployed in solid. These results may help further reveal IP spoofing, that has been examined for extended but never well understood.


Computer Network Management; Computer Network Security; IP Trace Back;


X. Dimitropoulos et al., “AS relationships: Inference and validation,” ACM SIGCOMM Comput. Commun. Rev., vol. 37, no. 1, pp. 29–40, Jan. 2007.

M. T. Goodrich, “Efficient packet marking for large-scale IP trace back,” in Proc. 9th ACM Conf. Comput. Commun. Secur. (CCS), 2002, pp. 117–126.

R. Beverly, A. Berger, Y. Hyun, and K. Claffy, “Understanding the efficacy of deployed internet source address validation filtering,” in Proc. 9th ACM SIGCOMM Conf. Internet Meas. Conf. (IMC), 2009, pp. 356–369.

A. Mankin, D. Massey, C.-L. Wu, S. F. Wu, and L. Zhang, “On design and evaluation of ‘intention-driven’ ICMP trace back,” in Proc. 10th Int. Conf. Comput. Commun. Netw., Oct. 2001, pp. 159–165.

J. Li, M. Sung, J. Xu, and L. Li, “Large-scale IP trace back in high-speed internet: Practical techniques and theoretical foundation,” in Proc. IEEE Symp. Secur. Privacy, May 2004, pp. 115–129.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2021, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at