Research paper on denial of service attack -

Internet - Tracing the Source of Denial of Service Attacks

Howard. An Analysis of Security Incidents on the Internet. PhD hesis, Carnegie Mellon University, August, 1998 6 Oliver Spatscheck and Larry Peterson. Defending Denial of Service Attacks in Scout. Proceedings of the 1999 ieee Symposi. Tracing the Source of Denial of Service Attacks, abstract: Denial of service attacks are becoming increasingly prevalent and serious, yet the anonymity that these attacks affords the hacker provides no means for a victim to trace the attack.

Another important drawback is that this technique runs on the assumption that the identification field in the IP header is always available for use.13 However, if a router needs to fragment a packet, it will have to use this identification field and will therefore not be able to tag that field for the traceback technique.14 Yet another assumption that provides. A fairly simple observation seems to answers this question. In modern society, it is increasingly difficult to keep secrets. For example, a few years ago, Intel encountered a bug in the Pentium chip, but did not release information about this bug. Unfortunately, the nature of denial of service attacks makes them very difficult to trace or prevent. Therefore the majority of recent work in the area has focused on tolerating theses attacks rather than preventing them.67.

Since IP traceback gives a user the ability to trace the exact path that network traffic takes in getting to that user, it can be used maliciously. For example, a web host could store data about the network paths that each user takes and could possibly sell this information to interested parties.

Furthermore, this solution would be fully known to all users, yet still impossible to break. That is, even if hackers know the full details of the implementation of the solution, it would be impossible for them to spoof IP addresses.

As the internet becomes increasingly vital to the everyday life of millions of people around the world, it also becomes increasingly vulnerable to hackers. Through forcing servers or web sites to shut down, hackers have the ability to affect almost every aspect of modern society; finances, safety, education, and many others.