Abstract

The Internet Protocol (IP) is the basic protocol for sending data over the Internet and many other computer networks. IP spoofing is the creation of Internet Protocol (IP) packets with a forged source IP address, with the purpose of thrashing the identity of the sender or an attacker can make it appear that the packet was sent by a different machine. The objective of this paper is to devise the passive IP trace back (PIT) scheme using Internet Control Message Protocol(ICMP) to avoid the operational obstacles of IP trace back schemes. PIT investigates ICMP error messages (path backscatter) triggered by spoofing traffic, and tracks the spoofers based on public available information (eg.topology). This scheme(PIT) discover the spoofers without any operational requirement and exhibits the causes, collection, and the statistical results on path backscatter, demonstrates the processes and effectiveness of PIT, and shows the captured locations of spoofers throughout applying PIT on the path backscatter data set. These results are capable of expose the spoofed IP locations.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.