This consists of Paper Presentations and Seminars even projects Topics for all branches areas like CSE,ECE,IT,CSSE,ECONE,EIE , , MCA , MBA Students .

Search For Paper Presentations or Seminar Topics Below


Tracking the Source of Spoofed IP Packets (Network security)


This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back toward their source. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or “spoofed,” source addresses. In this paper, we describe a general purpose trace back mechanism based on probabilistic packet marking in the network. Our approach allows a victim to identify the network path(s) traversed by attack traffic without requiring interactive operational support from Internet Service Providers (ISPs). Moreover, this traceback can be performed “post mortem”—after an
attack has completed. We present an implementation of this technology that is incrementally deployable, (mostly) backward compatible, and can be efficiently implemented using conventional technology.

Denial-Of-Service(DOS) attacks consume the resources of a remote host or network, thereby denying or degrading service to legitimate users. Such attacks are among the hardest security problems to address because they are simple to implement, difficult to prevent, and very difficult to trace.our paper mainly emphasizes on this area and focusses on this aspect.

No comments:

Post a Comment