Survey Bloom filter applications in network security: A state-of-the-art survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Recently, network resource is extremely vulnerable to DDoS attacks which has become a pressing problem due to scarce an efficient method to locate the real attacker. Especially, the more network topology advanced and complex such as 802.16e (WiBro), IP Traceback is difficult. According to, in this paper, the IP Traceback methodology using Markov Chain based on XOR operation is proposed in 802.16e. Also the paper provides a traceback method including: receiving data including access control router information according to a path of an attacker; filtering the data to hash the data, and storing the resultant hashed information; determining whether the data is normally received on the basis of the hashed information; and predicting a path loss on the basis of the determination result. Therefore, it is possible to perform an accurate IP traceback using a probabilistic packing marking method and a hash-based traceback method.