Sciweavers

IJSN
2007
82views more  IJSN 2007»
13 years 4 months ago
Vulnerabilities in distance-indexed IP traceback schemes
: In order to counter Denial-of-Service (DoS) attacks using spoofed source addresses, many IP traceback schemes have been proposed in the last few years. Among them, distanceindexe...
Jianping Pan, Lin Cai, Xuemin Shen
CCS
2007
ACM
13 years 10 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
INFOCOM
2008
IEEE
13 years 11 months ago
Spatial-Temporal Characteristics of Internet Malicious Sources
—This paper presents a large scale longitudinal study of the spatial and temporal features of malicious source addresses. The basis of our study is a 402-day trace of over 7 bill...
Zesheng Chen, Chuanyi Ji, Paul Barford