Abstract—This paper presents an evaluation of two promising schemes for tracing cyber-attacks, the well-known Deterministic Packet Marking, DPM, and a novel marking scheme for IP traceback, Deterministic Flow Marking, DFM. First of all we explore the DPM in detail and then by investigating the DFM, we analyze the pros and cons of both approaches in depth in terms of practicality and feasibility, so that shortcomings of each scheme are highlighted. This evaluation is based on CAIDA Internet traces October 2012 dataset. The results show that using DFM may reduce as many as 90 % of marked packets on average required for tracing attacks with no false positives, while it eliminates the spoofed marking embedded by the attacker as well as compromi...
In this paper, we present a new approach, called Flexible Deterministic Packet Marking (FDPM), to pe...
Abstract. Network forensics deals with capture, recording, analysis and inves-tigation of network tr...
Internet Protocol (IP) traceback is the enabling technology to control Internet crime. In this paper...
IP traceback through (authenticated) deterministic flow marking: an empirical evaluation Vahid Aghae...
DDoS attack source traceback is an open and challenging problem. Deterministic packet marking (DPM) ...
DDoS attack source traceback is an open and challenging problem. Deterministic packet marking (DPM) ...
Abstract—Internet Protocol (IP) traceback is the enabling technology to control Internet crime. In t...
Abstract. IP traceback technology is an important means combating Denial of Service (DoS) attacks in...
Internet Protocol (IP) traceback is the enabling technology to control Internet crime. In this paper...
In this article, we introduce the Internet deployment guidelines for Deterministic Packet Marking (D...
DDoS attack source traceback is an open and challenging problem. Deterministic packet marking (DPM) ...
Abstract—Defending against distributed denial-of-service attacks is one of the hardest security prob...
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back ...
Tracing malicious packets back to their source is important to defend the Internet against Denial of...
Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both...
In this paper, we present a new approach, called Flexible Deterministic Packet Marking (FDPM), to pe...
Abstract. Network forensics deals with capture, recording, analysis and inves-tigation of network tr...
Internet Protocol (IP) traceback is the enabling technology to control Internet crime. In this paper...
IP traceback through (authenticated) deterministic flow marking: an empirical evaluation Vahid Aghae...
DDoS attack source traceback is an open and challenging problem. Deterministic packet marking (DPM) ...
DDoS attack source traceback is an open and challenging problem. Deterministic packet marking (DPM) ...
Abstract—Internet Protocol (IP) traceback is the enabling technology to control Internet crime. In t...
Abstract. IP traceback technology is an important means combating Denial of Service (DoS) attacks in...
Internet Protocol (IP) traceback is the enabling technology to control Internet crime. In this paper...
In this article, we introduce the Internet deployment guidelines for Deterministic Packet Marking (D...
DDoS attack source traceback is an open and challenging problem. Deterministic packet marking (DPM) ...
Abstract—Defending against distributed denial-of-service attacks is one of the hardest security prob...
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back ...
Tracing malicious packets back to their source is important to defend the Internet against Denial of...
Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both...
In this paper, we present a new approach, called Flexible Deterministic Packet Marking (FDPM), to pe...
Abstract. Network forensics deals with capture, recording, analysis and inves-tigation of network tr...
Internet Protocol (IP) traceback is the enabling technology to control Internet crime. In this paper...