The problem of identifying the sources of a denial of service attack is among the hardest in the Internet security area, especially since attackers often use incorrect, or spoofed, source IP addresses. In this paper we present the results from a comparison between some of the most promising traceback techniques proposed to solve this problem. Our goal was to evaluate and analyse the most promising techniques on our way to find a more efficient approach. We have evaluated four different traceback approaches and summarized the results. Our own research were primary targeted at the iTrace approaches while the other approaches were evaluated based on the previous work. We conclude that there are two main disadvantages of the proposed approaches...
Abstract. Network forensics deals with capture, recording, analysis and inves-tigation of network tr...
Abstract. IP traceback technology is an important means combating Denial of Service (DoS) attacks in...
Abstract. In any (D)DoS attack, invaders may use incorrect or spoofed IP addresses in the attacking ...
The problem of identifying the sources of a denial of service attack is among the hardest in the Int...
Tracing malicious packets back to their source is important to defend the Internet against Denial of...
Internet Protocol (IP) trace back is the enabling technology to control Internet crime. In this pape...
Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both...
Today's Internet is extremely vulnerable to Distributed Denial of service (DDoS) attacks. There is t...
Abstract—This paper presents an evaluation of two promising schemes for tracing cyber-attacks, the w...
Today’s Internet is extremely vulnerable to Distributed Denial of service (DDoS) attacks. There is t...
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back ...
The threat of DDOS and other cyberattacks has increased during the last decade. In addition to the r...
With internet expanding in every aspect of businesses infrastructure, it becomes more and more impor...
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack ...
With internet expanding in every aspect of businesses infrastructure, it becomes more and more impor...
Abstract. Network forensics deals with capture, recording, analysis and inves-tigation of network tr...
Abstract. IP traceback technology is an important means combating Denial of Service (DoS) attacks in...
Abstract. In any (D)DoS attack, invaders may use incorrect or spoofed IP addresses in the attacking ...
The problem of identifying the sources of a denial of service attack is among the hardest in the Int...
Tracing malicious packets back to their source is important to defend the Internet against Denial of...
Internet Protocol (IP) trace back is the enabling technology to control Internet crime. In this pape...
Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both...
Today's Internet is extremely vulnerable to Distributed Denial of service (DDoS) attacks. There is t...
Abstract—This paper presents an evaluation of two promising schemes for tracing cyber-attacks, the w...
Today’s Internet is extremely vulnerable to Distributed Denial of service (DDoS) attacks. There is t...
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back ...
The threat of DDOS and other cyberattacks has increased during the last decade. In addition to the r...
With internet expanding in every aspect of businesses infrastructure, it becomes more and more impor...
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack ...
With internet expanding in every aspect of businesses infrastructure, it becomes more and more impor...
Abstract. Network forensics deals with capture, recording, analysis and inves-tigation of network tr...
Abstract. IP traceback technology is an important means combating Denial of Service (DoS) attacks in...
Abstract. In any (D)DoS attack, invaders may use incorrect or spoofed IP addresses in the attacking ...