Tracers placement for IP traceback against DDoS attacks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Attacker traceback with cross-layer monitoring in wireless multi-hop networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A practical and robust inter-domain marking scheme for IP traceback
Computer Networks: The International Journal of Computer and Telecommunications Networking
On deterministic packet marking
Computer Networks: The International Journal of Computer and Telecommunications Networking
A router-based technique to mitigate reduction of quality (RoQ) attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Single packet IP traceback in AS-level partial deployment scenario
International Journal of Security and Networks
Evaluating the partial deployment of an AS-level IP traceback system
Proceedings of the 2008 ACM symposium on Applied computing
An AS-level IP traceback system
CoNEXT '07 Proceedings of the 2007 ACM CoNEXT conference
Adaptive and selective packet marking in communication networks
ICCOM'05 Proceedings of the 9th WSEAS International Conference on Communications
Detecting DRDoS attacks by a simple response packet confirmation mechanism
Computer Communications
Dynamic Probabilistic Packet Marking with Partial Non-Preemption
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
An AS-level overlay network for IP traceback
IEEE Network: The Magazine of Global Internetworking - Special issue title on recent developments in network intrusion detection
A table-driven approach for IP traceback based on network statistic analysis
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
The automatic peer-to-peer signature for source address validation
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part I
DTRAB: combating against attacks on encrypted protocols through traffic-feature analysis
IEEE/ACM Transactions on Networking (TON)
ICCOMP'10 Proceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I
Distributed denial of service attack detection using an ensemble of neural classifier
Computer Communications
Multi-stage change-point detection scheme for large-scale simultaneous events
Computer Communications
Tracing the true source of an IPv6 datagram using policy based management system
APNOMS'06 Proceedings of the 9th Asia-Pacific international conference on Network Operations and Management: management of Convergence Networks and Services
Cooperative security management enhancing survivability against DDoS attacks
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Two novel packet marking schemes for IP traceback
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
A novel rate limit algorithm against meek DDoS attacks
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Intrusion detection with CUSUM for TCP-Based DDoS
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Inter-domain security management to protect legitimate user access from DDoS attacks
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
A lightweight IP traceback mechanism on IPv6
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
NS-2 based IP traceback simulation against reflector based DDoS attack
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
Overlay logging: an IP traceback scheme in MPLS network
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Intra-domain IP traceback using OSPF
Computer Communications
Tracing attackers with deterministic edge router marking (DERM)
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Authenticated IPv6 packet traceback against reflector based packet flooding attack
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
A secure packet marking scheme for IP traceback in IPv6
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Hi-index | 0.25 |
In this article we present the current state of the art in IP traceback. The rising threat of cyber attacks, especially DDoS, makes the IP traceback problem very relevant to today's Internet security. Each approach is evaluated in terms of its pros and cons. We also relate each approach to practical deployment issues on the existing Internet infrastructure. The functionality of each approach is discussed in detail and then evaluated. We conclude with a discussion on some legal implications of IP traceback.