Analysis of Trace Back Techniques in Cyber Crime

Yuvaraj and Dr.S. Venkatanarayanan

Network-based attackers can easily hide their identity through IP manipulation, keystrokes, NATs (network address translators), mobile IP, or other forms, reducing the risk of tampering. However, today's IP network infrastructure can-not effectively deter and identify motivated with well-resourced attackers. Therefore, it is desirable to develop efficient and effective surveillance systems that are attributable to attackers and help rebuild cybercrime. Here are numerous kinds of attacks on the network. In our paper, we analyzed two types of network attacks: single-packet attacks with stepping stone attacks.

Volume 11 | 04-Special Issue

Pages: 276-279