Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
On inferring autonomous system relationships in the internet
IEEE/ACM Transactions on Networking (TON)
Controlling high bandwidth aggregates in the network
ACM SIGCOMM Computer Communication Review
GOSSIB vs. IP Traceback Rumors
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Towards an accurate AS-level traceroute tool
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Authenticated Autonomous System Traceback
AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
Collecting the internet AS-level topology
ACM SIGCOMM Computer Communication Review
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
A DoS-limiting network architecture
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
Building an AS-topology model that captures route diversity
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Tracing cyber attacks from the practical perspective
IEEE Communications Magazine
Secure Border Gateway Protocol (S-BGP)
IEEE Journal on Selected Areas in Communications
An interval centroid based spread spectrum watermarking scheme for multi-flow traceback
Journal of Network and Computer Applications
A novel sequential watermark detection model for efficient traceback of secret network attack flows
Journal of Network and Computer Applications
Hi-index | 0.00 |
Service-oriented computing (SOC) due to their distributed and lose coupled nature are very vulnerable to distributed denial of service (DDoS) attacks. IP spoofing makes it difficult for the victim to determine the packet's origin. There is a need for a mechanism that could enable real-time traceback of the origins of the attacks. In this paper, we propose a novel protocol, fast autonomous system traceback (FAST) to traceback to the attack originating autonomous systems (AS). The multifold advantages of FAST include reconstruction requires just around 5-10 packets and reconstruction takes just a few seconds. We validate the performance through extensive simulations over the datasets obtained from traceroute.