Passive IP Traceback: Disclosing the Locations
of IP Spoofers From Path Backscatter
Abstract— Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter It is long known attackers may use forged source IP address to conceal their real locations. To capture the spoofers, a number of IP traceback mechanisms have been proposed. However, due to the challenges of deployment, there has been not a widely adopted IP traceback solution, at least at the Internet level. As a result, the mist on the locations of spoofers has never been dissipated till now. This paper proposes passive IP traceback (PIT) that bypasses the deployment difﬁculties of IP traceback techniques. PIT investigates Internet Control Message Protocol error messages < Final Year Projects 2016 > named path backscatter triggered by spooﬁng trafﬁc, and tracks the spoofers based on public available information (e.g., topology). In this way, PIT can ﬁnd the spoofers without any deployment requirement. This paper illustrates the causes, collection, and the statistical results on path backscatter, demonstrates the processes and effectiveness of PIT, and shows the captured locations of spoofers through applying PIT on the path backscatter data set.
sales on Site11,021