Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
An algebraic approach to IP traceback
ACM Transactions on Information and System Security (TISSEC)
Tradeoffs in probabilistic packet marking for IP traceback
STOC '02 Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
Efficient packet marking for large-scale IP traceback
Proceedings of the 9th ACM conference on Computer and communications security
Tracing Anonymous Packets to Their Approximate Source
LISA '00 Proceedings of the 14th USENIX conference on System administration
Toward a framework for forensic analysis of scanning worms
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
IEEE 802.11 user fingerprinting and its applications for intrusion detection
Computers & Mathematics with Applications
Design and analysis of a hierarchical IP traceback system
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
PinDr0p: using single-ended audio features to determine call provenance
Proceedings of the 17th ACM conference on Computer and communications security
The effect of leaders on the consistency of group behaviour
International Journal of Sensor Networks
Security and Communication Networks
Temporal accountability and anonymity in medical sensor networks
Mobile Networks and Applications - Special issue on Wireless and Personal Communications
Hi-index | 0.00 |
Tracing back an anonymous hacker in the internet has been very hard to accomplish mainly due to the complexity of the internet and the lack of any deployed technology targeting this goal. In this paper, we introduce the most prominent research work done in the area of traceback. The traceback problem could be separated into IP traceback, traceback across stepping stones and worm traceback.