Recent surveys show that DDoS attack is still one of the major threats to the Internet security. Many techniques have been proposed to trace the origin of attacking packets, known as IP traceback problem, using either hash-based packet logging or probabilistic packet marking. However, both approaches have scalability problems under the heavy DDoS attacks in terms of the space and computational overheads. In this paper, we propose a novel scalable IP Traceback scheme by utilizing the advantage of both packet logging and marking to balance the overheads at routers and at the victim, hence scalable for both sides. The baseline idea of our approach is to sample a very small percentage (e.g., 1%) of packets at the routers, and save t...
Internet Protocol (IP) traceback is the enabling technology to control Internet crime. In this paper...
In (Distributed) Denial of Service attack ((D)DoS), attack-ers send a huge number of packets with sp...
From many years, the methods to defend against Denial of Service attacks have been very attractive f...
Abstract — Recent surveys show that DDoS attack is still one of the major threats to the Internet se...
In this paper, we present a new approach, called Flexible Deterministic Packet Marking (FDPM), to pe...
Traceback schemes aim at identifying the source(s) of a sequence of packets and the nodes these pack...
DDoS attack source traceback is an open and challenging problem. Deterministic packet marking (DPM) ...
DDoS attack source traceback is an open and challenging problem. Deterministic packet marking (DPM) ...
Abstract—Traceback schemes aim at identifying the source(s) of a sequence of packets and the nodes t...
Internet has been widely applied in various fields, more and more network security issues emerge and...
For the macroscopic traceback problem, we propose an algorithm, which leverages the well-known Chand...
IP spoofing is sending Internet Protocol (IP) packets with a forged source IP address to conceal the...
Distributed Denial of Service (DDoS) is one of the most difficult security problems to address. Whil...
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack ...
Abstract—Internet Protocol (IP) traceback is the enabling technology to control Internet crime. In t...
Internet Protocol (IP) traceback is the enabling technology to control Internet crime. In this paper...
In (Distributed) Denial of Service attack ((D)DoS), attack-ers send a huge number of packets with sp...
From many years, the methods to defend against Denial of Service attacks have been very attractive f...
Abstract — Recent surveys show that DDoS attack is still one of the major threats to the Internet se...
In this paper, we present a new approach, called Flexible Deterministic Packet Marking (FDPM), to pe...
Traceback schemes aim at identifying the source(s) of a sequence of packets and the nodes these pack...
DDoS attack source traceback is an open and challenging problem. Deterministic packet marking (DPM) ...
DDoS attack source traceback is an open and challenging problem. Deterministic packet marking (DPM) ...
Abstract—Traceback schemes aim at identifying the source(s) of a sequence of packets and the nodes t...
Internet has been widely applied in various fields, more and more network security issues emerge and...
For the macroscopic traceback problem, we propose an algorithm, which leverages the well-known Chand...
IP spoofing is sending Internet Protocol (IP) packets with a forged source IP address to conceal the...
Distributed Denial of Service (DDoS) is one of the most difficult security problems to address. Whil...
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack ...
Abstract—Internet Protocol (IP) traceback is the enabling technology to control Internet crime. In t...
Internet Protocol (IP) traceback is the enabling technology to control Internet crime. In this paper...
In (Distributed) Denial of Service attack ((D)DoS), attack-ers send a huge number of packets with sp...
From many years, the methods to defend against Denial of Service attacks have been very attractive f...