Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
An algebraic approach to IP traceback
ACM Transactions on Information and System Security (TISSEC)
An Evaluation of Different IP Traceback Approaches
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
IP Traceback: A New Denial-of-Service Deterrent?
IEEE Security and Privacy
Inferring Internet denial-of-service activity
ACM Transactions on Computer Systems (TOCS)
Network Security: A Hacker's Perspective,
Network Security: A Hacker's Perspective,
Tracing cyber attacks from the practical perspective
IEEE Communications Magazine
A novel approach for protection of confidential web contents
ECC'11 Proceedings of the 5th European conference on European computing conference
Hi-index | 0.00 |
Today's life has been revolutionized by Internet. Future of Internet is even more promising because of emerging technologies like ubiquitous computing, context sensitive, adaptive and reconfigurable applications. Security is the most important issue concerned with Internet. Internet is exposed to threats like system penetration, financial fraud, theft of proprietary information, Denial of Service (DoS)/Distributed Denial of Service (DDoS) Attacks etc. Currently, DoS/DDoS attacks are the most expensive computer crimes. The attacker launching this type of attacks commonly masks his identity using IP spoofing. It is very difficult to identify the sources of a DoS/DDoS attack. IP trace back methods are used to locate the source of packet causing DoS/DDoS. In this paper we have carried out a survey of different existing trace back schemes highlighting their advantages and disadvantages. We also suggest our own hybrid IP traceback technique.