An analysis of security incidents on the Internet 1989-1995
An analysis of security incidents on the Internet 1989-1995
Providing guaranteed services without per flow management
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Server Selection Using Dynamic Path Characterization in Wide-Area Networks
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Tracing Anonymous Packets to Their Approximate Source
LISA '00 Proceedings of the 14th USENIX conference on System administration
You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers
IEEE Transactions on Parallel and Distributed Systems
Coloring the Internet: IP Traceback
ICPADS '06 Proceedings of the 12th International Conference on Parallel and Distributed Systems - Volume 1
Survey of network-based defense mechanisms countering the DoS and DDoS problems
ACM Computing Surveys (CSUR)
A practical and robust inter-domain marking scheme for IP traceback
Computer Networks: The International Journal of Computer and Telecommunications Networking
Dynamic probabilistic packet marking for efficient IP traceback
Computer Networks: The International Journal of Computer and Telecommunications Networking
Vulnerabilities in distance-indexed IP traceback schemes
International Journal of Security and Networks
A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN
Information Security and Cryptology
IP traceback based on Chinese Remainder Theorem
CIIT '07 The Sixth IASTED International Conference on Communications, Internet, and Information Technology
Security management with scalable distributed IP traceback
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Towards behavioral control in multi-player network games
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
A hotspot-based protocol for attack traceback in mobile ad hoc networks
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Unified defense against DDoS attacks
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
The curse of ease of access to the internet
ICISS'07 Proceedings of the 3rd international conference on Information systems security
An effective defense mechanism against DoS/DDoS attacks in flow-based routers
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
Deterministic packet marking with link signatures for IP traceback
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Two novel packet marking schemes for IP traceback
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
A distributed network architecture for robust internet voting systems
EGOV'05 Proceedings of the 4th international conference on Electronic Government
An adaptive edge marking based hierarchical IP traceback system
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Detecting IP spoofing by modelling history of IP address entry points
AIMS'13 Proceedings of the 7th IFIP WG 6.6 international conference on Autonomous Infrastructure, Management, and Security: emerging management mechanisms for the future internet - Volume 7943
Hi-index | 0.00 |
Distributed denial-of-service attack is one of the greatest threats to the Internet today. One of the biggest difficulties in defending against this attack is that attackers always use incorrect, or "spoofed" IP source addresses to disguise their true origin. In this paper, we present a packet marking algorithm which allows the victim to traceback the approximate origin of spoofed IP packets. The difference between this proposal and previous proposals lies in two points. First, we develop three techniques to adjust the packet marking probability, which significantly reduces the number of packets needed by the victim to reconstruct the attack path. Second, we give a detailed analysis of the vulnerabilities of probabilistic packet marking, and describe a version of our adjusted probabilistic packet marking scheme whose performance is not affected by spoofed marking fields.