Sciweavers

25 search results - page 1 / 5
» Authenticated Autonomous System Traceback
Sort
View
AINA
2004
IEEE
13 years 8 months ago
Authenticated Autonomous System Traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet making the defense against Distributed Denial of Service attacks one of the ha...
Vamsi Paruchuri, Arjan Durresi, Rajgopal Kannan, S...
ISCC
2006
IEEE
13 years 11 months ago
An Autonomous Architecture for Inter-Domain Traceback across the Borders of Network Operation
The difficulties of achieving an inter-domain traceback architecture come from the issues of overcoming network operation boundaries, especially the leakage of sensitive informat...
Hiroaki Hazeyama, Youki Kadobayashi, Daisuke Miyam...
NOMS
2008
IEEE
13 years 11 months ago
Towards an efficient implementation of traceback mechanisms in autonomous systems
—One of the major problems due to denial of service attacks is the identification of fault packets. To resolve this problem, several IP traceback methods have been defined. In th...
Karima Boudaoud, F. LeBorgne
ICC
2011
IEEE
206views Communications» more  ICC 2011»
12 years 4 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
IJSN
2007
129views more  IJSN 2007»
13 years 5 months ago
Single packet IP traceback in AS-level partial deployment scenario
Tracing IP packets to their sources, known as IP traceback, is an important task in defending against IP spoofing and DoS attacks. Log-based IP traceback technique is to log pack...
Turgay Korkmaz, Chao Gong, Kamil Saraç, San...