Sciweavers

13 search results - page 2 / 3
» Non-intrusive IP traceback for DDoS attacks
Sort
View
JDCTA
2010
139views more  JDCTA 2010»
12 years 12 months ago
Tracing Anonymous Mobile Attackers in Wireless Network
In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environme...
Ming Hour Yang, Shiuhpyng Shieh
INFOCOM
2005
IEEE
13 years 10 months ago
FIT: fast Internet traceback
— Traceback mechanisms are a critical part of the defense against IP spoofing and DoS attacks, as well as being of forensic value to law enforcement. Currently proposed IP trace...
Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song
EUC
2006
Springer
13 years 8 months ago
A Lightweight IP Traceback Mechanism on IPv6
Due to the stateless nature of the internet, it is an intricate problem to determine the source of spoofed attacking packets. To handle this problem we utilize the IP traceback mec...
Syed Obaid Amin, Myung Soo Kang, Choong Seon Hong
ISCC
2003
IEEE
13 years 10 months ago
On the Issues of IP Traceback for IPv6 and Mobile IPv6
As the Internet becomes pervasive, the vulnerability of some fundamental design aspects of the Internet has also become significant. Among which, Denial-of-Service (DoS) and Distr...
Henry C. J. Lee, Miao Ma, Vrizlynn L. L. Thing, Yi...
ACSAC
2003
IEEE
13 years 10 months ago
An IP Traceback Technique against Denial-of-Service Attacks
Reflector attack [9] belongs to one of the most serious types of Denial-of-Service (DoS) attacks, which can hardly be traced by contemporary traceback techniques, since the marked...
Zhaole Chen, Moon-Chuen Lee