Using router stamping to identify the source of IP packets
Proceedings of the 7th ACM conference on Computer and communications security
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Network support for IP traceback
IEEE/ACM Transactions on Networking (TON)
IEEE/ACM Transactions on Networking (TON)
Novel Hybrid Schemes Employing Packet Marking and Logging for IP Traceback
IEEE Transactions on Parallel and Distributed Systems
Inferring internet denial-of-service activity
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
A More Practical Approach for Single-Packet IP Traceback using Packet Logging and Marking
IEEE Transactions on Parallel and Distributed Systems
Advanced implementation of IP telephony at Czech universities
WSEAS TRANSACTIONS on COMMUNICATIONS
Threats to voice over IP communications systems
WSEAS Transactions on Computers
Web-based IP telephony penetration system evaluating level of protection from attacks and threats
WSEAS TRANSACTIONS on COMMUNICATIONS
Hi-index | 0.00 |
The technique of IP traceback is used to overcome Denial-of-Service attacks. This paper deals with explaining the two types of IP traceback techniques namely, Packet Marking and Packet Logging which have been proposed earlier. The paper further explains about a hybrid IP traceback technique which uses both packet marking and logging. The hybrid technique claims to have a better performance level in terms of reducing the storage overhead at the routers by half and the access time overhead by the number of neighboring routers. Future enhancements have been proposed in the domain of security for the entire system.