On power-law relationships of the Internet topology
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
On the origin of power laws in Internet topologies
ACM SIGCOMM Computer Communication Review
IEEE/ACM Transactions on Networking (TON)
IP Traceback: A New Denial-of-Service Deterrent?
IEEE Security and Privacy
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
Mohonk: mobile honeypots to trace unwanted traffic early
Proceedings of the ACM SIGCOMM workshop on Network troubleshooting: research, theory and operations practice meet malfunctioning reality
Inferring Internet denial-of-service activity
ACM Transactions on Computer Systems (TOCS)
Towards Stateless Single-Packet IP Traceback
LCN '07 Proceedings of the 32nd IEEE Conference on Local Computer Networks
Single packet IP traceback in AS-level partial deployment scenario
International Journal of Security and Networks
IEEE Communications Magazine
An AS-level IP traceback system
CoNEXT '07 Proceedings of the 2007 ACM CoNEXT conference
An AS-level overlay network for IP traceback
IEEE Network: The Magazine of Global Internetworking - Special issue title on recent developments in network intrusion detection
Hi-index | 0.00 |
Distributed Denial of Service (DDoS) attacks currently represent a serious threat to the appropriate operation of Internet services. We propose an IP traceback system to be deployed at the level of Autonomous Systems (ASes) to deal with this threat. Our proposed AS-level IP traceback system contrasts with previous work as it requires a priori no knowledge of the network topology while allowing single packet traceback and incremental deployment. We also investigate and evaluate the strategic placement of our systems, showing that the partial deployment offered by our proposed system provides relevant results in IP traceback, rendering it feasible for large-scale networks such as the Internet.