Marking Technique to Isolate Boundary Router and Attacker

  • Authors:
  • Vaarun Vijairaghavan;Darshak Shah;Pallavi Galgali;Amit Shah;Nikhil Shah;Venkatesh Srinivasan;Lokesh Bhatia

  • Affiliations:
  • IBM India Software Labs;IBM India Systems and Technology Labs;IBM India Systems and Technology Labs;Synygy India;Synygy India;Zensar Technologies;-

  • Venue:
  • Computer
  • Year:
  • 2007

Quantified Score

Hi-index 4.10

Visualization

Abstract

A new method for identifying denial-of-service attacks uses the attacker's media accesscontrol address for identification and traceback. The technique pinpoints the boundary routerthe attacker is connected to, allows identification after the attack, and imposes minimal extraload on the network.