Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
An analysis of using reflectors for distributed denial-of-service attacks
ACM SIGCOMM Computer Communication Review
Controlling high bandwidth aggregates in the network
ACM SIGCOMM Computer Communication Review
Pi: A Path Identification Mechanism to Defend against DDoS Attacks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
IEEE Communications Magazine
Hi-index | 0.00 |
Tracing the attackers in a distributed denial-of-service(DDoS) attack is particularly difficult since attackers spoof the source addresses We present a novel approach to IP Traceback – Deterministic Edge Router Marking (DERM) The proposed scheme is scalable to thousands of attackers, is very simple to implement at the routers, has no bandwidth overhead and needs minimal processing and storage requirements at the victim As each complete mark fits into a single packet, our scheme can also be used for per-packet filtering and as a congestion signature in a pushback protocol The traceback procedure requires a small number of packets and can be performed during the post-mortem analysis of an attack Only limited co-operation is required from Internet Service Providers (ISP) They do not have to reveal the topology of their internal networks.