![]() PIT inve stigates Internet Control Message Protocol (ICMP) error messages (named path backscatter) triggered by spoofing traffic, and tracks the spoofers based on public available information such as topology. ![]() This paper proposes passive IP traceback (PIT) that bypasses the deployment difficulties of IP traceback techniques and comes up with a solution to the problem. As a result, the mist on the locations of spoofers has never been dissolute till now. However, due to the challenges regarding deployment services, there has been not any widely adopted IP traceback solution, at least at the Internet level. To capture the spoofers, various IP traceback mechanisms have been proposed. ![]() It is long known attackers may utilize fashioned source IP location to cover their real areas. Though PIT cannot work in all the spoofing attacks, it may be the most useful mechanism to trace hackers before an Internet-level trackback system has been deployed in real. These results can help further reveal IP spoofing, which has been studied for long but never well understood. This paper illustrates the causes, collection, and the statistical results on path backscatter, demonstrates the processes and effectiveness of PIT, and shows the captured locations of hackers through applying PIT on the path backscatter data set. In this way, PIT can find the attackers without any deployment requirement. PIT investigates Internet Control Message Protocol error messages (named path backscatter) triggered by spoofing traffic, and tracks the hackers based on public available information (e.g., topology). ![]() This paper proposes passive IP trackback (PIT) that bypasses the deployment difficulties of IP tracers techniques. As a result, the mist on the locations of hackers has never been dissipated till now. However, due to the challenges of deployment, there has been not a widely adopted IP trackback solution, at least at the Internet level. To capture the attackers, a number of IP trackback mechanisms have been proposed. It is long known attackers may use forged source IP address to conceal their real locations. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |