Sciweavers

Share
IWCMC
2006
ACM

Tracers placement for IP traceback against DDoS attacks

9 years 9 months ago
Tracers placement for IP traceback against DDoS attacks
This paper explores the tracers deployment problem for IP traceback methods how many and where the tracers should be deployed in the network to be effective for locating the attack origins. The minimizing the number of tracers deployment problems depended on locating the attack origins are defined. The problem is proved to be NP-complete. A heuristic method which can guarantee that the distance between any attack origin and its first met tracer be within an assigned distance is proposed. The upper bound for the probability of an undetected attack node can be calculated in advance and used to evaluate the number of tracers needed for the proposed heuristic method. Extended simulations are performed to study the performance of the tracers deployment. Categories and Subject Descriptors C.2.0 [Computer-Communication Networks]: General—Security and protection; D.2.1 [Computer-Communication Networks]: Network Architecture and Design—Distributed networks General Terms Design, Managemen...
Chun-Hsin Wang, Chang-Wu Yu, Chiu-Kuo Liang, Kun-M
Added 14 Jun 2010
Updated 14 Jun 2010
Type Conference
Year 2006
Where IWCMC
Authors Chun-Hsin Wang, Chang-Wu Yu, Chiu-Kuo Liang, Kun-Ming Yu, Wen Ouyang, Ching-Hsien Hsu, Yu-Guang Chen
Comments (0)
books