The proposed scheme is useful in areas where monitoring the IP address is more important as packet modification is carried out, such as cyber fraud, illicit processing of data packets where any important information has to be transmitted. Independent of the labelling probability and the structure of the simple network graph, the built graph is warranted to obtain the correctness assigned by the consumer. We suggested a Rectified Probabilistic Packet Labeling Algorithm in this method to encrypt the packet to label the attacked packets in the routers.
Key words: Packet Marking, Security, Graph.
|