Abstract
This paper proposes an IP traceback mechanism for a large scale distributed Online voting system. The proposed system is based on replication and tolerates arbitrary failures of servers. The service based on security concerns of web server is implemented by IP trace back system based on Deterministic Packet Marking scheme (DPM). It provides a defense system with ability to reconstruct the source IP when required. Unlike other marking schemes, Deterministic Packet Marking reduces the computational overhead and needs no additional bandwidth. The main objective of this paper is to propose an effective trace back mechanism for DDoS attacks using Extended DPM scheme. The proposed scheme is applied to Secure Online voting system, which in turn improves the security process involved in the system. It resolves the disadvantages of existing online voting methods by increasing throughput of processing web server.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Khan, Z.S., Akram, N., Alghathbar, K., Sher, M., Mehmood, R.: Secure Single Packet IP Traceback Mechanism to Identify The Attack Source. In: International Conference for Internet Technology and Secure Transaction, ICITST 2010 (2010)
Zhaoyang, Q., Chufeng, H.: A Novel Deterministic Packet Marking Scheme For IP Traceback. In: Workshop on Power Electronics and Intelligent Transportation System, pp. 38–41 (2008)
Bhavani, Y., Reddy, N.P.: An Efficient IP Traceback Through Packet Marking Algorithm. International Journal of Network Security and Its Applications, IJNSA 2010, 132–142 (2010)
Xie, Y., Yu, S.Z.: Monitoring The Application Layer DDoS Attacks For Popular Websites. IEEE/ACM Transaction on Networking 17, 15–25 (2009)
Adithya, R., Ed-Dawson: Issue In Secure E-Voting Schemes, http://eprints.qut.edu.au/25538/2009
Xiang, Y., Zhou, W., Guo, M.: Flexible Deterministic Packet Marking: An IP Traceback System To Find The Real Source Of Attacks. IEEE Transaction on Parallel and Distributed Systems, IEEE-TPDS 2009, 567–580 (2009)
Peisert, S., Bishop, M., Yasinsac, A.: Vote Selling, Voter Anonymity And Forensic Logging of Electronic Voting Machines. In: Proceeding of the 42nd International Conference on System Sciences, pp. 1–10 (2009)
Storer, T., Lock, R.: Acuraccy: The Fundamental Requirement For Voting Systems. In: International Conference on Availability, Reliability and Security (ICARS), pp. 374–379 (2009)
Grimm, R., Volkamer, M.: Development of A Formal It-Security Model For Remote Electronic Voting Systems. In: Proceeding of Electronic Voting/ACM, pp. 185–196 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rajam, V.K.S., Pandian, B.S., Shalinie, S.M., Pandey, T. (2012). Application of IP Traceback Mechanism to OnlineVoting System. In: Thilagam, P.S., Pais, A.R., Chandrasekaran, K., Balakrishnan, N. (eds) Advanced Computing, Networking and Security. ADCONS 2011. Lecture Notes in Computer Science, vol 7135. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29280-4_72
Download citation
DOI: https://doi.org/10.1007/978-3-642-29280-4_72
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29279-8
Online ISBN: 978-3-642-29280-4
eBook Packages: Computer ScienceComputer Science (R0)