Sciweavers

11 search results - page 1 / 3
» Marking Technique to Isolate Boundary Router and Attacker
Sort
View
COMPUTER
2007
65views more  COMPUTER 2007»
13 years 4 months ago
Marking Technique to Isolate Boundary Router and Attacker
Vaarun Vijairaghavan, Darshak Shah, Pallavi Galgal...
TPDS
2008
133views more  TPDS 2008»
13 years 4 months ago
A More Practical Approach for Single-Packet IP Traceback using Packet Logging and Marking
Tracing IP packets back to their origins is an important step in defending the Internet against denial-of-service (DoS) attacks. Two kinds of IP traceback techniques have been prop...
Chao Gong, Kamil Saraç
GLOBECOM
2007
IEEE
13 years 11 months ago
On the (in)Effectiveness of Probabilistic Marking for IP Traceback Under DDoS Attacks
—Distributed denial-of-service attacks (DDoS) pose an immense threat to the Internet. The most studied solution is to let routers probabilistically mark packets with partial path...
Vamsi Paruchuri, Arjan Durresi, Raj Jain
ACSAC
2003
IEEE
13 years 10 months ago
An IP Traceback Technique against Denial-of-Service Attacks
Reflector attack [9] belongs to one of the most serious types of Denial-of-Service (DoS) attacks, which can hardly be traced by contemporary traceback techniques, since the marked...
Zhaole Chen, Moon-Chuen Lee
ACSC
2003
IEEE
13 years 10 months ago
A Practical Method to Counteract Denial of Service Attacks
Today distributed denial of service (DDoS) attacks are causing major problems to conduct online business over the Internet. Recently several schemes have been proposed on how to p...
Udaya Kiran Tupakula, Vijay Varadharajan