Providing guaranteed services without per flow management
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Network support for IP traceback
IEEE/ACM Transactions on Networking (TON)
Controlling high bandwidth aggregates in the network
ACM SIGCOMM Computer Communication Review
IEEE/ACM Transactions on Networking (TON)
D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks
IEEE Transactions on Dependable and Secure Computing
Defense against spoofed IP traffic using hop-count filtering
IEEE/ACM Transactions on Networking (TON)
Packet Filtering Based on Source Router Marking and Hop-Count
LCN '07 Proceedings of the 32nd IEEE Conference on Local Computer Networks
A proposal for new marking scheme with its performance evaluation for IP traceback
WSEAS Transactions on Computer Research
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
A survey of security visualization for computer network logs
Security and Communication Networks
Security and Communication Networks
Hi-index | 0.00 |
Ever increasing rate of Denial of Service (DoS) attacks presents severe security threats to the internet. In this study, a backpressure scheme to filter DoS attack traffic at the earliest possible is presented. This paper utilises markings stamped in the packets by the routers to detect DoS attacks. To improve the accuracy of detection, the detection process is augmented with hop count values from IP header. A backpressure technique partially deployed at the upstream routers is also proposed to prevent congestion at victim. Simulation studies show that our scheme drops most of the attack traffic at the earliest time.