Journal of Computer Science

A Proficient Traceback Approach Using Provincial Locality Aspects to Eliminate Denial of Service Attacks

S. Periyasamy and K. Duraiswamy

DOI : 10.3844/jcssp.2013.271.276

Journal of Computer Science

Volume 9, Issue 2

Pages 271-276

Abstract

A Denial-of-Service (DoS) attack, a menace to the availability of resources and service to the intended user, is usually by augmenting the traffic in the communication medium. These attacks originate in either ways, internal or external to a network with the aim to suspend the legitimate user from getting his/her service. The DoS attacks have been countered through various approaches, yet this problem remains stable in field. The traceback mechanisms of the attacker necessitate a large amount of valuable information which is usually hidden by the attacker or not documented in the network. Moreover the network has strict constraints over the usage of memory resources by the nodes and routers, equivalent to an empty memory nature. The amount of data reasonably required for computation would increase the processing delay which is usually unexpected. The counter measures proposed tried to detect the network under attack or to track the attacker with some degree of information available. Nowadays these attacks have evolved to break out from all those detection approaches with greater immunity to not reveal their identity. This study works with the physical zone addresses to detect and traceback the identity of the attacker. The packet sent from the attacker carries merely the part of its identity. Yet the Provincial Assessment Attributes (PAA) possesses the geographical locality aspects in terms of Continent Code, Country Code, State Codes and the Area Codes along with its IP address. Accepting the factor that IP is spoofed in most cases, the routers in the path are still able to keep track of these PAA prospects irrespective of the faked IP. Hence this mechanism could be implemented with minimal computation, leading to the attacker with considerable and fruitful results in identifying the same. Besides, this method takes deep care to authenticate and not to affect the traffic of legitimate users.

Copyright

© 2013 S. Periyasamy and K. Duraiswamy. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.