Tracing back attacks against encrypted protocols
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Performance analysis of probabilistic packet marking in IPv6
Computer Communications
A router-based technique to mitigate reduction of quality (RoQ) attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Vulnerabilities in distance-indexed IP traceback schemes
International Journal of Security and Networks
Single packet IP traceback in AS-level partial deployment scenario
International Journal of Security and Networks
Detecting DRDoS attacks by a simple response packet confirmation mechanism
Computer Communications
Fast autonomous system traceback
Journal of Network and Computer Applications
Visibility: a novel concept for characterising provable network digital evidences
International Journal of Security and Networks
Enhanced and authenticated deterministic packet marking for IP traceback
APPT'07 Proceedings of the 7th international conference on Advanced parallel processing technologies
DTRAB: combating against attacks on encrypted protocols through traffic-feature analysis
IEEE/ACM Transactions on Networking (TON)
IP trace back techniques to ferret out denial of service attack source
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
Distributed denial of service attack detection using an ensemble of neural classifier
Computer Communications
Hi-index | 0.25 |
The integrity of the Internet is severely impaired by rampant denial of service and distributed DoS attacks. It is by no means trivial to devise a countermeasure to address these attacks because of their anonymous and distributed nature. This article presents a brief survey of the most promising recently proposed schemes for tracing cyber attacks: IP traceback. Since IP traceback technology is evolving rapidly, for the community to better comprehend and capture the properties of disparate traceback approaches, we first classify these schemes from multiple aspects. From the perspective of practicality and feasibility, we then analyze and explore the advantages and disadvantages of these schemes in depth so that shortcomings and possible enhancements of each scheme are highlighted. Finally, open problems and future work are discussed, and concluding remarks are drawn.