Reveal IP Spoofers Location from Route Backsatter and Passive IP Traceback
Akshay Homkar1, Sandip Satav2, D. R. Patil3
1Mr. Akshay D. Homkar, Department of Computer Engineering, Jayawantrao Sawant College of Engineering, Pune (Maharashtra). India.

2Sandip Satav, Assistant Professor, Department of Computer Engineering, Vishwakarma Institute of Technology, Pune (Maharashtra). India.
3Mrs. Darshana Patil, Assistant Professor, Department of Computer Engineering, Jayawantrao Sawant College of Engineering, Pune (Maharashtra). India.
Manuscript received on December 12, 2016. | Revised Manuscript received on December 13, 2016. | Manuscript published on December 25, 2016. | PP: 19-22 | Volume-4 Issue-7, December 2016. | Retrieval Number: F1132094616
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Source IP address is used to hide the locations of the hackers, spoofed. To identify the true spot of the spoofers Development of IP traces back mechanisms are used. Because of no common IP Trace back mechanism was adopted, Exact spoofers location was not identified till now. We implement Passive IP Traceback (PIT) mechanism to overcome the difficulties of the earlier techniques. Path backscatter messages (ICMP messages) generated by intermediate devices in the network and traceback the spoofers using topology get detected by PIT. To identify the locations of the spoofers, we apply Pit on path backscatter data set. The geographical location details of routing device near to IP spoofers are found, by employing the TTL field in IP packets.
Keywords: PIT (Passive IP Trackback), Computer Network Management, Computer Network Security, Denial of Service (DoS), IP traceback.