An analysis of using reflectors for distributed denial-of-service attacks
ACM SIGCOMM Computer Communication Review
Distributed Denial of Service Attacks and the Zombie Ant Effect
IT Professional
Tracing Network Attacks to Their Sources
IEEE Internet Computing
IP Traceback: A New Denial-of-Service Deterrent?
IEEE Security and Privacy
Defending against flooding-based distributed denial-of-service attacks: a tutorial
IEEE Communications Magazine
IEEE Communications Magazine
Hi-index | 0.00 |
IPv6 can provide end-to-end security services such as access control, confidentiality, and data integrity with less impact on network performance. However, we can also prospect that there will be much more dangerous and tremendous type of attack on IPv6 than that on IPv4. So, we propose new IP traceback mechanism for tracing the spoofed real source on IPv6 packet using authentication mechanism. Proposed authentication mechanism supports the key disclosure mechanism on IPv6 packet marking with ICMPv6 on the IP traceback process.