메뉴 건너뛰기




Volumn 41, Issue 7, 2003, Pages 142-153

On IP traceback

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SYSTEM FIREWALLS; INTERNET; PACKET NETWORKS;

EID: 0042308614     PISSN: 01636804     EISSN: None     Source Type: Journal    
DOI: 10.1109/MCOM.2003.1215651     Document Type: Article
Times cited : (140)

References (12)
  • 1
    • 0036804084 scopus 로고    scopus 로고
    • Defending against flooding-based distributed denial-of-service attacks: A tutorial
    • Oct.
    • R. K. C. Chang, "Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial," IEEE Commun. Mag., Oct. 2002, pp. 42-51.
    • (2002) IEEE Commun. Mag. , pp. 42-51
    • Chang, R.K.C.1
  • 2
    • 0036349004 scopus 로고    scopus 로고
    • SAVE: Source address validity enforcement protocol
    • J. Li et al., "SAVE: Source Address Validity Enforcement Protocol," Proc. INFOCOM, 2002, vol. 3, pp. 1557-66.
    • (2002) Proc. INFOCOM , vol.3 , pp. 1557-1566
    • Li, J.1
  • 4
    • 0035361712 scopus 로고    scopus 로고
    • Network support for IP traceback
    • June
    • S. Savage et al., "Network Support for IP Traceback," IEEE/ACM Trans. Net., vol. 9, no. 3, June 2001, pp. 226-37.
    • (2001) IEEE/ACM Trans. Net. , vol.9 , Issue.3 , pp. 226-237
    • Savage, S.1
  • 5
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • D. X. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," Proc. INFOCOM, 2001, vol. 2, pp. 878-86.
    • (2001) Proc. INFOCOM , vol.2 , pp. 878-886
    • Song, D.X.1    Perrig, A.2
  • 6
    • 0004194675 scopus 로고    scopus 로고
    • IETF draft
    • S. M. Bellovin, "ICMP Traceback Messages," IETF draft, 2000; http://www.research.att.com/smb/papers/draft-bellovin-itrace-00.txt.
    • (2000) ICMP Traceback Messages
    • Bellovin, S.M.1
  • 7
    • 84950242640 scopus 로고    scopus 로고
    • On design and evaluation of 'intention-driven' ICMP traceback
    • S. F. Wu et al., "On Design and Evaluation of 'Intention-Driven' ICMP Traceback," Proc. 10th Int'l. Conf. Comp. Commun. and Nets., 2001, pp. 159-65.
    • (2001) Proc. 10th Int'l. Conf. Comp. Commun. and Nets. , pp. 159-165
    • Wu, S.F.1
  • 8
    • 85084163540 scopus 로고    scopus 로고
    • Centertrack: An IP overlay network for tracking DoS floods
    • R. Stone, "Centertrack: An IP Overlay Network for Tracking DoS Floods," Proc. 9th USENIX Sec. Symp., 2000, pp. 199-212.
    • (2000) Proc. 9th USENIX Sec. Symp. , pp. 199-212
    • Stone, R.1
  • 9
    • 0036947597 scopus 로고    scopus 로고
    • Single-packet IP traceback
    • Dec.
    • A. C. Snoeren et al., "Single-Packet IP Traceback," IEEE/ACM Trans. Net., vol. 10, no. 6, Dec. 2002, pp. 721-34.
    • (2002) IEEE/ACM Trans. Net. , vol.10 , Issue.6 , pp. 721-734
    • Snoeren, A.C.1
  • 10
    • 85011016678 scopus 로고    scopus 로고
    • Tracing anonymous packets to their approximate source
    • H. Burch and B. Cheswick, "Tracing Anonymous Packets to Their Approximate Source," Proc. USENIX LISA, 2000, pp. 319-27.
    • (2000) Proc. USENIX LISA , pp. 319-327
    • Burch, H.1    Cheswick, B.2
  • 12
    • 0036564696 scopus 로고    scopus 로고
    • Challenges to automated attack traceback
    • May-June
    • S. C. Lee and C. Shields, "Challenges to Automated Attack Traceback," IT Professional, vol. 4, no. 3, May-June 2002, pp. 12-18.
    • (2002) IT Professional , vol.4 , Issue.3 , pp. 12-18
    • Lee, S.C.1    Shields, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.