Sciweavers

10 search results - page 2 / 2
» Toward a More Practical Marking Scheme for IP Traceback
Sort
View
ACSAC
2002
IEEE
13 years 9 months ago
GOSSIB vs. IP Traceback Rumors
Abstract—To identify sources of distributed denial-of-service attacks, path traceback mechanisms have been proposed. Traceback mechanisms relying on probabilistic packet marking ...
Marcel Waldvogel
EUC
2006
Springer
13 years 8 months ago
A Lightweight IP Traceback Mechanism on IPv6
Due to the stateless nature of the internet, it is an intricate problem to determine the source of spoofed attacking packets. To handle this problem we utilize the IP traceback mec...
Syed Obaid Amin, Myung Soo Kang, Choong Seon Hong
IJSN
2007
82views more  IJSN 2007»
13 years 4 months ago
Vulnerabilities in distance-indexed IP traceback schemes
: In order to counter Denial-of-Service (DoS) attacks using spoofed source addresses, many IP traceback schemes have been proposed in the last few years. Among them, distanceindexe...
Jianping Pan, Lin Cai, Xuemin Shen

Publication
167views
13 years 4 months ago
A Network Coding Approach to IP Traceback
Traceback schemes aim at identifying the source(s) of a sequence of packets and the nodes these packets traversed. This is useful for tracing the sources of high volume traffic, e...
Pegah Sattari, Minas Gjoka, Athina Markopoulou
AINA
2004
IEEE
13 years 8 months ago
Authenticated Autonomous System Traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet making the defense against Distributed Denial of Service attacks one of the ha...
Vamsi Paruchuri, Arjan Durresi, Rajgopal Kannan, S...