Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Number Theory for Computing
Distributed Denial of Service Attacks and the Zombie Ant Effect
IT Professional
Adjusted Probabilistic Packet Marking for IP Traceback
NETWORKING '02 Proceedings of the Second International IFIP-TC6 Networking Conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications
Tracing Anonymous Packets to Their Approximate Source
LISA '00 Proceedings of the 14th USENIX conference on System administration
Centertrack: an IP overlay network for tracking DoS floods
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Hi-index | 0.00 |
IP traceback is a defense method to help a victim for identifying the sources of attacking traffic. In this paper, we propose an IP traceback method based on the Chinese Remainder Theorem to require routers mark packets probabilistically with partial path information during forwarding packets. Our method can interoperate seamlessly with legacy routers and it is incrementally deployable. A victim does not need to maintain the network topology while it reconstructs attack paths. The simulation reveals that, in comparison with the previous works, our method uses fewer numbers of marked packets and less time to reconstruct the complete attack paths.