StarBED and SpringOS: large-scale general purpose network testbed and supporting software
valuetools '06 Proceedings of the 1st international conference on Performance evaluation methodolgies and tools
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
Logging based IP Traceback in switched ethernets
Proceedings of the 1st European Workshop on System Security
Scalable traceback against distributed denial of service
International Journal of Web and Grid Services
Honeypot back-propagation for mitigating spoofing distributed denial-of-service attacks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Hi-index | 0.01 |
The IP traceback technique detects sources of attacknodes and the paths traversed by anonymous DDoS (Distributed Denial of Service) flows with spoofed source addresses. We propose a hierarchical IP traceback architecture, which decomposes the Internet-wide traceback procedure into inter-domain traceback and intradomain traceback. Our proposed method is different from existing approaches in that our method is independent from a single IPtraceback mechanism, and domain decomposition is basedon existing operational models of the Internet. Moreover, ithas the capability of being used for not only the IPv4 network, but also the IPv6 network.