Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Centertrack: an IP overlay network for tracking DoS floods
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Efficient packet marking for large-scale IP traceback
Proceedings of the 9th ACM conference on Computer and communications security
IP Traceback: A New Denial-of-Service Deterrent?
IEEE Security and Privacy
Novel Hybrid Schemes Employing Packet Marking and Logging for IP Traceback
IEEE Transactions on Parallel and Distributed Systems
On deterministic packet marking
Computer Networks: The International Journal of Computer and Telecommunications Networking
Expert Systems with Applications: An International Journal
Probabilistic packet marking for large-scale IP traceback
IEEE/ACM Transactions on Networking (TON)
IP Traceback Using Digital Watermark and Honeypot
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Proactive attacker localization in wireless LAN
ACM SIGCOMM Computer Communication Review
Proactive attacker localization in WLAN
ACM SIGMOBILE Mobile Computing and Communications Review
Cooperative security management enhancing survivability against DDoS attacks
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Inter-domain security management to protect legitimate user access from DDoS attacks
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
NS-2 based IP traceback simulation against reflector based DDoS attack
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
Intra-domain IP traceback using OSPF
Computer Communications
SVM based packet marking technique for traceback on malicious DDoS traffic
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
Authenticated IPv6 packet traceback against reflector based packet flooding attack
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse
Journal of Network and Systems Management
Hi-index | 0.01 |
Using an IP traceback architecture in which routers store data about packets and adjacent forwarding nodes, we can trace IP packets to their source, even when the source IP address is forged.