منابع مشابه
An IP Traceback Model for Network Forensics
Network forensics deals with capture, recording, analysis and investigation of network traffic to traceback the attackers. Its ultimate goal is to provide sufficient evidence to allow the perpetrator to be prosecuted. IP traceback is an important aspect in the investigation process where the real attacker is identified by tracking source address of the attack packets. In this paper we classify ...
متن کاملIP Traceback in a Switched Ethernet Network
IP traceback is the generic term given to systems that allow the tracing of IP packets back to their originating machine. A common shortcoming shared by existing traceback proposals is that they are able to identify the source network, but not the source host. Our work extends the traceback process by allowing the tracing of frames within the originating network (once this has been identified) ...
متن کاملHardware Support for a Hash-Based IP Traceback
The Source Path Isolation Engine (SPIE) is a system capable of tracing a single IP packet to its point of origin or point of ingress into a network. SPIE supports tracing by storing a few bits of unique information about each packet for a period of time as the packets traverse the network. Software implementations of SPIE can trace packets through networks comprised of slow to medium speed rout...
متن کاملAn Improved Ip Traceback Mechanism for Network Security
IP traceback is amongst the main challenges that face the security of today’s Internet. Many techniques were proposed, including inband packhranits alert and outband packets each of them has advantages and disadvantages. Source IP spoofing attacks are critical issues to the Internet. These attacks are considered to be sent from bot infected hosts. There has been active research on IP traceback ...
متن کاملSession Based Logging (SBL) for IP-Traceback on Network Forensics
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, the source IP can be easily falsified which results in numerous problems including infamous denial of service attacks. The combination of smart devices with powerful processing capabilities once observed only in mainfr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE/ACM Transactions on Networking
سال: 2001
ISSN: 1063-6692
DOI: 10.1109/90.929847