SlideShare a Scribd company logo
Sadankumar.B
  08C41A1263
   Denial-of-service (DoS) is a type of attack in
    networks in which an attacker may be able to
    prevent legitimate users from accessing email, web
    sites, online accounts(banking, etc.)
    Unfortunately, mechanisms for dealing with DoS
    attacks haven’t advanced at the same pace as the
    attacks themselves.
   This paper presents a new method for identifying
    denial-of-service attacks that uses the attacker’s
    media access control address for identification and
    trace back.


                                                      2
   Introduction
   DoS.
   DDoS.
   SIPT for identifying the boundary router.
   Existing mechanisms.
   Conclusion.
   References.




                                                3
 In a denial-of-service (DoS) attack, an
  attacker attempts to prevent legitimate user
  from accessing information or services by
  targeting his computer and its network
  connection, or the computers and network
  of the sites that he is trying to use.
 Eg: flooding the network with information.




                                                 4
In a distributed denial-of-service
(DDoS) attack, an attacker may use
other user’s computer to attack another
computer. By taking advantage of security
vulnerabilities or weaknesses, an attacker
could take control of other computers,
thereby sending huge amounts of data to a
web site or send spam to particular email
addresses.




                                             5
Speedy IP Trace back (SIPT) method
 finds boundary router (the router
 connected directly to the client).
 Once we know the boundary router and
 the attacker’s media access control (MAC)
 address, we can identify the attacker and
 find the attack path.



                                             6
Boundary router:

A router that connects the internet to a company’s intranet(a
private computer network that uses IP technologies to
secure any part of organization’s information).

Media Access Control Address(MAC):

MAC is a unique identifier assigned to network interfaces for
communication on the physical network segment.




                                                                7
With SIPT, each router determines whether
the packet came from a client, the router
inserts a data link connection identifier for the
source (client) and the IP address of its own
incoming interface.
With this additional source link address
information in the packet, the destination can
identify the attacker’s boundary router.




                                                    8
1)   Ingress filtering
2)   Link Testing
3)   Packet marking




                         9
   The ingress filtering approach configures
    routers to block packets that arrive with
    illegitimate source addresses. This requires a
    router with enough power to examine the source
    address of every packet, and sufficient
    knowledge to distinguish between legitimate and
    illegitimate addresses




                                                      10
   Administrators use two different types of link tests:
   input debugging and
   controlled flooding.
   Input Debugging: With this test, administrators
    capture and record specific details on IP packets that
    traverse networks.
   Once administrators know that an attack is in
    progress, they must find a unique characteristic
    common across attack packets. This is called the
    attack signature, which is used to differentiate
    attack traffic and determine the inbound interface


                                                             11
   This involves sending large bursts of traffic link by
    link upstream and monitoring the impact on the
    rate of received attacking packets. While an attack
    is in progress, an administrator can run extended
    pings across each upstream link to see which has
    an effect on attacking traffic.
   Once the administrator finds this link on the router
    closest to the victim, the process is repeated with
    the next router upstream.

                                                            12
Packet marking
                 13
   The router plays a vital role in SIPT.

   The router inserts the client’s data link identifier
    and its own IP address into the packet’s IP
    header using one of the several available
    packet-marking techniques.




                                                           14
Every packet that the server receives is hence
marked with the MAC address of the machine
that sent it and the IP address of the router the
machine is connected to.

 The marking must be done at the first router
because it alone knows the client’s MAC address.
Subsequently, the attacker’s source MAC address
will be lost when the MAC header is replaced in
the next hop.



                                                    15
The server retrieves the IP address of
the router the attacker is directly
connected to and the attacker’s MAC
address. The system can identify the
attacker with just these two pieces of
information.




                                          16
   Since our method has backward compatibility
    and supports incremental deployment, the
    probability of finding an attacker will increase with
    the percentage of routers.

   The SIPT approach doesn’t constitute a
    hop-by-hop trace back. Instead, it directly finds
    the boundary router connected to the attacker.




                                                            17
   1. S. Specht and R. Lee, “Distributed Denial of
    Service: Taxonomies of Attacks, Tools, and
    Countermeasures,”
   2. P. Ferguson and D. Senie, Network Ingress
    Filtering.
   3. S. Savage et al., “Network Support for IP Trace
    back,”
   4. C. Gong and K. Sarac, “IP Trace back with
    Packet Marking
   and Logging,”



                                                         18
Speedy ip trace back(sipt) for identifying sadhan

More Related Content

PDF
An enhanced ip traceback mechanism for tracking the attack source using packe...
DOCX
Ip traceback seminar full report
DOC
Efficient packet marking for large scale ip trace back(synopsis)
PPTX
Ip trace ppt
PDF
Ijnsa050211
PDF
call for papers, research paper publishing, where to publish research paper, ...
PPTX
Overview of IP traceback mechanism
PDF
An improved ip traceback mechanism for network
An enhanced ip traceback mechanism for tracking the attack source using packe...
Ip traceback seminar full report
Efficient packet marking for large scale ip trace back(synopsis)
Ip trace ppt
Ijnsa050211
call for papers, research paper publishing, where to publish research paper, ...
Overview of IP traceback mechanism
An improved ip traceback mechanism for network

What's hot (19)

DOC
A precise termination condition of the probabilistic packet marking algorithm...
PPTX
DOCX
Passive ip traceback disclosing the locations
DOCX
PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...
DOCX
Passive ip traceback disclosing the locations of ip spoofers from path backsc
PDF
Passive ip traceback disclosing the locations of ip spoofers from path backsc...
PDF
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
PDF
BYPASSING OF DEPLOYMENT DIFFICULTIES OF IP TRACEBACK TECHNIQUES USING NEW PAS...
PDF
TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS
PDF
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
DOCX
Detection and localization of multiple spoofing attackers in wireless networks
PDF
Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backs...
PDF
Security Issues in Next Generation IP and Migration Networks
PDF
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
PDF
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
PDF
BasepaperControlling IP Spoofing through Interdomain Packet Filters
DOC
Controlling ip spoofing through inter domain packet filters(synopsis)
PPT
Module 5 Sniffers
A precise termination condition of the probabilistic packet marking algorithm...
Passive ip traceback disclosing the locations
PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...
Passive ip traceback disclosing the locations of ip spoofers from path backsc
Passive ip traceback disclosing the locations of ip spoofers from path backsc...
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
BYPASSING OF DEPLOYMENT DIFFICULTIES OF IP TRACEBACK TECHNIQUES USING NEW PAS...
TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Detection and localization of multiple spoofing attackers in wireless networks
Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backs...
Security Issues in Next Generation IP and Migration Networks
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
BasepaperControlling IP Spoofing through Interdomain Packet Filters
Controlling ip spoofing through inter domain packet filters(synopsis)
Module 5 Sniffers
Ad

Similar to Speedy ip trace back(sipt) for identifying sadhan (20)

PPTX
CY.pptx
PDF
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
PPTX
Lecture 7 Attacker and there tools.pptx
PPT
Network Security fundamentals
PDF
COMPARATIVE STUDY OF IP TRACEBACK TECHNIQUES
PPT
Lecture7-8-Network Protocls attack in cyber.ppt
PDF
REVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMP
PPTX
Network security
PPT
Network Security
PDF
vulnerabilities in IP.pdf
PPTX
Network security
DOCX
Packet%20marking%20report
PPT
CS10NETWOKSecurityhdhgsfdhsdheahgqergd.ppt
PPT
Hacking Cisco
PDF
Intrusion preventionintrusion detection
PDF
PDF
PDF
How prevent dos
PPT
Isys20261 lecture 07
PPT
透视消费者.ppt
CY.pptx
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
Lecture 7 Attacker and there tools.pptx
Network Security fundamentals
COMPARATIVE STUDY OF IP TRACEBACK TECHNIQUES
Lecture7-8-Network Protocls attack in cyber.ppt
REVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMP
Network security
Network Security
vulnerabilities in IP.pdf
Network security
Packet%20marking%20report
CS10NETWOKSecurityhdhgsfdhsdheahgqergd.ppt
Hacking Cisco
Intrusion preventionintrusion detection
How prevent dos
Isys20261 lecture 07
透视消费者.ppt
Ad

Recently uploaded (20)

PPTX
1. Introduction to Computer Programming.pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
A Presentation on Touch Screen Technology
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Mushroom cultivation and it's methods.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
August Patch Tuesday
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Hybrid model detection and classification of lung cancer
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
1. Introduction to Computer Programming.pptx
WOOl fibre morphology and structure.pdf for textiles
Enhancing emotion recognition model for a student engagement use case through...
A Presentation on Touch Screen Technology
Hindi spoken digit analysis for native and non-native speakers
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Mushroom cultivation and it's methods.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
August Patch Tuesday
DP Operators-handbook-extract for the Mautical Institute
MIND Revenue Release Quarter 2 2025 Press Release
NewMind AI Weekly Chronicles - August'25-Week II
Hybrid model detection and classification of lung cancer
OMC Textile Division Presentation 2021.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Chapter 5: Probability Theory and Statistics
TLE Review Electricity (Electricity).pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf

Speedy ip trace back(sipt) for identifying sadhan

  • 2. Denial-of-service (DoS) is a type of attack in networks in which an attacker may be able to prevent legitimate users from accessing email, web sites, online accounts(banking, etc.)  Unfortunately, mechanisms for dealing with DoS attacks haven’t advanced at the same pace as the attacks themselves.  This paper presents a new method for identifying denial-of-service attacks that uses the attacker’s media access control address for identification and trace back. 2
  • 3. Introduction  DoS.  DDoS.  SIPT for identifying the boundary router.  Existing mechanisms.  Conclusion.  References. 3
  • 4.  In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate user from accessing information or services by targeting his computer and its network connection, or the computers and network of the sites that he is trying to use.  Eg: flooding the network with information. 4
  • 5. In a distributed denial-of-service (DDoS) attack, an attacker may use other user’s computer to attack another computer. By taking advantage of security vulnerabilities or weaknesses, an attacker could take control of other computers, thereby sending huge amounts of data to a web site or send spam to particular email addresses. 5
  • 6. Speedy IP Trace back (SIPT) method finds boundary router (the router connected directly to the client).  Once we know the boundary router and the attacker’s media access control (MAC) address, we can identify the attacker and find the attack path. 6
  • 7. Boundary router: A router that connects the internet to a company’s intranet(a private computer network that uses IP technologies to secure any part of organization’s information). Media Access Control Address(MAC): MAC is a unique identifier assigned to network interfaces for communication on the physical network segment. 7
  • 8. With SIPT, each router determines whether the packet came from a client, the router inserts a data link connection identifier for the source (client) and the IP address of its own incoming interface. With this additional source link address information in the packet, the destination can identify the attacker’s boundary router. 8
  • 9. 1) Ingress filtering 2) Link Testing 3) Packet marking 9
  • 10. The ingress filtering approach configures routers to block packets that arrive with illegitimate source addresses. This requires a router with enough power to examine the source address of every packet, and sufficient knowledge to distinguish between legitimate and illegitimate addresses 10
  • 11. Administrators use two different types of link tests:  input debugging and  controlled flooding.  Input Debugging: With this test, administrators capture and record specific details on IP packets that traverse networks.  Once administrators know that an attack is in progress, they must find a unique characteristic common across attack packets. This is called the attack signature, which is used to differentiate attack traffic and determine the inbound interface 11
  • 12. This involves sending large bursts of traffic link by link upstream and monitoring the impact on the rate of received attacking packets. While an attack is in progress, an administrator can run extended pings across each upstream link to see which has an effect on attacking traffic.  Once the administrator finds this link on the router closest to the victim, the process is repeated with the next router upstream. 12
  • 14. The router plays a vital role in SIPT.  The router inserts the client’s data link identifier and its own IP address into the packet’s IP header using one of the several available packet-marking techniques. 14
  • 15. Every packet that the server receives is hence marked with the MAC address of the machine that sent it and the IP address of the router the machine is connected to.  The marking must be done at the first router because it alone knows the client’s MAC address. Subsequently, the attacker’s source MAC address will be lost when the MAC header is replaced in the next hop. 15
  • 16. The server retrieves the IP address of the router the attacker is directly connected to and the attacker’s MAC address. The system can identify the attacker with just these two pieces of information. 16
  • 17. Since our method has backward compatibility and supports incremental deployment, the probability of finding an attacker will increase with the percentage of routers.  The SIPT approach doesn’t constitute a hop-by-hop trace back. Instead, it directly finds the boundary router connected to the attacker. 17
  • 18. 1. S. Specht and R. Lee, “Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures,”  2. P. Ferguson and D. Senie, Network Ingress Filtering.  3. S. Savage et al., “Network Support for IP Trace back,”  4. C. Gong and K. Sarac, “IP Trace back with Packet Marking  and Logging,” 18