DDoS attack source traceback is an open and challenging problem. Deterministic packet marking (DPM) is a simple and effective traceback mechanism, but the current DPM based traceback schemes are not practical due to their scalability constraint. We noticed a factor that only a limited number of computers and routers are involved in an attack session. Therefore, we only need to mark these involved nodes for traceback purpose, rather than marking every node of the Internet as the existing schemes doing. Based on this finding, we propose a novel marking on demand (MOD) traceback scheme based on the DPM mechanism. In order to traceback to involved attack source, what we need to do is to mark these involved ingress routers using the traditional ...
IP traceback is one of the defense mechanisms for Distributed Denial of Service (DDoS) attacks. Howe...
Abstract. Network forensics deals with capture, recording, analysis and inves-tigation of network tr...
Traceback schemes aim at identifying the source(s) of a sequence of packets and the nodes these pack...
DDoS attack source traceback is an open and challenging problem. Deterministic packet marking (DPM) ...
DDoS attack source traceback is an open and challenging problem. Deterministic packet marking (DPM) ...
Abstract—This paper presents an evaluation of two promising schemes for tracing cyber-attacks, the w...
Abstract—Internet Protocol (IP) traceback is the enabling technology to control Internet crime. In t...
Internet Protocol (IP) traceback is the enabling technology to control Internet crime. In this paper...
Abstract. IP traceback technology is an important means combating Denial of Service (DoS) attacks in...
Abstract — Recent surveys show that DDoS attack is still one of the major threats to the Internet se...
IP traceback through (authenticated) deterministic flow marking: an empirical evaluation Vahid Aghae...
In (Distributed) Denial of Service attack ((D)DoS), attack-ers send a huge number of packets with sp...
In this paper, we present a new approach, called Flexible Deterministic Packet Marking (FDPM), to pe...
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back ...
In this dissertation, a novel approach to Internet Protocol (IP) Traceback - Deterministic Packet Ma...
IP traceback is one of the defense mechanisms for Distributed Denial of Service (DDoS) attacks. Howe...
Abstract. Network forensics deals with capture, recording, analysis and inves-tigation of network tr...
Traceback schemes aim at identifying the source(s) of a sequence of packets and the nodes these pack...
DDoS attack source traceback is an open and challenging problem. Deterministic packet marking (DPM) ...
DDoS attack source traceback is an open and challenging problem. Deterministic packet marking (DPM) ...
Abstract—This paper presents an evaluation of two promising schemes for tracing cyber-attacks, the w...
Abstract—Internet Protocol (IP) traceback is the enabling technology to control Internet crime. In t...
Internet Protocol (IP) traceback is the enabling technology to control Internet crime. In this paper...
Abstract. IP traceback technology is an important means combating Denial of Service (DoS) attacks in...
Abstract — Recent surveys show that DDoS attack is still one of the major threats to the Internet se...
IP traceback through (authenticated) deterministic flow marking: an empirical evaluation Vahid Aghae...
In (Distributed) Denial of Service attack ((D)DoS), attack-ers send a huge number of packets with sp...
In this paper, we present a new approach, called Flexible Deterministic Packet Marking (FDPM), to pe...
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back ...
In this dissertation, a novel approach to Internet Protocol (IP) Traceback - Deterministic Packet Ma...
IP traceback is one of the defense mechanisms for Distributed Denial of Service (DDoS) attacks. Howe...
Abstract. Network forensics deals with capture, recording, analysis and inves-tigation of network tr...
Traceback schemes aim at identifying the source(s) of a sequence of packets and the nodes these pack...