Sciweavers

40 search results - page 1 / 8
» Using router stamping to identify the source of IP packets
Sort
View
CCS
2000
ACM
13 years 9 months ago
Using router stamping to identify the source of IP packets
Denial of Service and Distributed Denial of Service attacks have cost millions of dollars to online companies. Unfortunately, these attacks are particularly di cult to stop since ...
Thomas W. Doeppner, Philip N. Klein, Andrew Koyfma...
GLOBECOM
2006
IEEE
13 years 10 months ago
RIM: Router Interface Marking for IP Traceback
—Distributed Denial-of-Service (DDoS) attacks have become a major threat to the Internet. As a countermeasure against DDoS attacks, IP traceback schemes identify the network path...
Ruiliang Chen, Jung Min Park, Randolph Marchany
ICC
2011
IEEE
206views Communications» more  ICC 2011»
12 years 4 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
TPDS
2008
133views more  TPDS 2008»
13 years 4 months ago
A More Practical Approach for Single-Packet IP Traceback using Packet Logging and Marking
Tracing IP packets back to their origins is an important step in defending the Internet against denial-of-service (DoS) attacks. Two kinds of IP traceback techniques have been prop...
Chao Gong, Kamil Saraç
CN
2008
100views more  CN 2008»
13 years 4 months ago
Packet forwarding with source verification
Abstract-- Routers in the Internet do not perform any verification of the source IP address contained in the packets, leading to the possibility of IP spoofing. The lack of such ve...
Craig A. Shue, Minaxi Gupta, Matthew P. Davy