Survey of Traceback Methods

Now days, internet is expanding day by day. Everyday some new threats are detected and some new attacks like Dos and DDoS are launched. So the problem of identifying such kinds of threats is very difficult in network security. It is very difficult to distinguish between normal traffic and DDoS traffic because DoS hide their actual identity. In this situation, it is necessary for the victim to identify the exact source or the origin of packet by using traceback method. It means that it is important to find the router, from which, the packet was entered into network so that attack rate can also be reduced. This paper presents different traceback methods to trace the packets or to identify the origin of a packets on network.

[1]  Kamil Saraç,et al.  Single packet IP traceback in AS-level partial deployment scenario , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[2]  A. M. Natarajan,et al.  A New Promising IP Traceback Approach and its Comparison with Existing Approaches , 2007 .

[3]  Emmanuel S. Pilli,et al.  IPv6 Packet Traceback: A Survey , 2013 .

[4]  Daniel Massey,et al.  On design and evaluation of "intention-driven" ICMP traceback , 2001, Proceedings Tenth International Conference on Computer Communications and Networks (Cat. No.01EX495).

[5]  Paul Ferguson,et al.  Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.

[6]  Anna R. Karlin,et al.  Network support for IP traceback , 2001, TNET.

[7]  A. Nur Zincir-Heywood,et al.  IP traceback through (authenticated) deterministic flow marking: an empirical evaluation , 2013, EURASIP Journal on Information Security.

[8]  Nirwan Ansari,et al.  On deterministic packet marking , 2007, Comput. Networks.

[9]  Nirwan Ansari,et al.  IP traceback with deterministic packet marking , 2003, IEEE Communications Letters.

[10]  Ashwani Parashar,et al.  Improved deterministic packet marking algorithm , 2013, 2013 15th International Conference on Advanced Computing Technologies (ICACT).