In the modernized era, numerous types of attacks are noticed on the internet, along with the utmost destructive attacks called distributed denial of service attacks. With these types of attacks legitimate users are not able to access the authorized services. IP traceback scheme is the only way to trace the original source of the attack. Researchers have proposed various traceback schemes in the past, but none is able to provide comprehensive efficient results because mostly traceback schemes work on single shortest path from victim to attackers. In the latest scenario, it becomes more challengeable if single path destroys with no other option has for trace back. In this paper, we proposed a new scheme where three best shortest paths out of many different paths are considered from victim to the attackers. With this it not only confirms the guarantee of traceback but also depicts improved results if any one or more than one paths are destroyed to catch the attacker. The simulation results are shown and compared with other techniques which have only single path to reach the attackers.
Read full abstract