Sie sind auf Seite 1von 11

F le x ib le

D e te rm in istic
P a ck e t M a rk in g
An IP Trace back System
to Find
the Real Source of
Attacks

AIM :
Internet Protocol ( IP ) trace back
is the enabling technology to
control Internet crime .
About the project
vW e p re se n t a n o ve la n d p ra ctica lIP tra ce b a ck
syste m ca lle d Fle xib le D e te rm in istic Pa cke t
M a rkin g ( F D P M ).
v
vFDPM provides a defense system with the ability
to find out the real sources of attacking
packets that traverse through the network.
v
vit also adaptively changes its marking rate
according to the load of the participating
router by a flexible flow-based marking scheme.
vFDPM requires a moderately small number of
packets to complete the Trace back process.
v
vFDPM can trace a large number of sources in
one trace back process with low false
positive rates.
v
vThe built-in overload prevention mechanism
makes this system capable of achieving a
good trace back result even when the router
is heavily loaded.
v
System Analysis
 E X IS T IN G S Y S T E M :

§ PPM algorithm : More importantly , without a


proper termination condition, the attack graph
constructed by the PPM algorithm would be
wrong.

 Disadvantages:

Ø Cannot find out Packet travel Path.


Ø Packet can be lost and Duplicate packets can
be Received at the Receiver.
Ø Receiver does not have the original packet.
Because of the More no of Duplication
message received at the receiver.

PROPOSED SYSTEM:

FDPM Algorithm :

The FDPM algorithm provides an autonomous way for


the original PPM algorithm to determine its
termination.
The most significant merit of the FDPM algorithm is
that when the algorithm terminates it guarantees
that the constructed attack graph is correct, with
a specified level of confidence.
 


We carry out simulations on the FDPM
algorithm and show that the FDPM algorithm
can guarantee the correctness of the
constructed attack graph.
Advantages:

Ø  Different probabilities that a router marks the


attack packets .
Ø Easy to find out packet loss and Duplicate
packets.
Ø Find out each and every packet path.
Ø To reduce the network traffic.

Hardware
requirements:

 

Processor : Any Processor above


500 Mhz. 
Ram : 128Mb
Hard Disk : 10 Gb. 
Input device : Standard Keyboard and
Mouse. 
Output device : Monitor (VGA and High
Resolution) 
Software
requirements: 

Operating System : Windows server 2000


family
Techniques : JDK 1.5  
Front End : Java Swing.
Implementation : Socket in Java.

 THANK YOU

Das könnte Ihnen auch gefallen