메뉴 건너뛰기




Volumn 52, Issue 2, 2005, Pages 217-244

Trade-offs in probabilistic packet marking for IP traceback

Author keywords

Denial of Service

Indexed keywords

NETWORK PACKETS; PACKET HEADER;

EID: 27844501172     PISSN: 00045411     EISSN: 00045411     Source Type: Journal    
DOI: 10.1145/1059513.1059517     Document Type: Review
Times cited : (37)

References (18)
  • 2
    • 0004075434 scopus 로고    scopus 로고
    • ICMP traceback messages
    • draft-bellovin-itrace-00.txt
    • BELLOVIN, S. M. 2000. ICMP traceback messages. Internet Draft: draft-bellovin-itrace-00.txt.
    • (2000) Internet Draft
    • Bellovin, S.M.1
  • 7
    • 27844574631 scopus 로고    scopus 로고
    • Efficient schemes for probabilistic packet marking
    • University of Massachusetts
    • DONG, Q., ADLER, M., AND HIRATA, K. 2004. Efficient schemes for probabilistic packet marking. Amherst Tech. Rep. 2004-67, University of Massachusetts.
    • (2004) Amherst Tech. Rep. , vol.2004 , Issue.67
    • Dong, Q.1    Adler, M.2    Hirata, K.3
  • 8
    • 0003553457 scopus 로고    scopus 로고
    • Network ingress filetring: Defeating denial of service attacks which employ IP source address spoofing
    • FERGUSON, P., AND SENIE, D. 1998. Network ingress filetring: Defeating denial of service attacks which employ IP source address spoofing. The Internet Society RFC 2267.
    • (1998) The Internet Society RFC , vol.2267
    • Ferguson, P.1    Senie, D.2
  • 10
    • 3042802739 scopus 로고    scopus 로고
    • Tracing the source of network attack: A technical, legal and societal problem
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • LEE, S., AND SHIELDS, C. 2001. Tracing the source of network attack: A technical, legal and societal problem. In Proceedings of the 2001 IEEE Workshop on Information Assurance and Security. IEEE Computer Society Press, Los Alamitos, Calif.
    • (2001) Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
    • Lee, S.1    Shields, C.2
  • 12
    • 0035010963 scopus 로고    scopus 로고
    • On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • PARK, K., AND LEE, H. 2001a. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. In Proceedings of the IEEE INFOCOM. IEEE Computer Society Press, Los Alamitos, Calif., 338-347.
    • (2001) Proceedings of the IEEE INFOCOM , pp. 338-347
    • Park, K.1    Lee, H.2
  • 13
    • 0001083965 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed dos attack prevention in power-law internets
    • ACM, New York
    • PARK, K., AND LEE, H. 2001b. On the effectiveness of route-based packet filtering for distributed dos attack prevention in power-law internets. In Proceedings of the ACM SIGCOMM. ACM, New York.
    • (2001) Proceedings of the ACM SIGCOMM
    • Park, K.1    Lee, H.2
  • 14
    • 0031122982 scopus 로고    scopus 로고
    • Effective erasure codes for reliable computer communication protocols
    • RIZZO, L. 1997. Effective erasure codes for reliable computer communication protocols. ACM Comput. Commun. Rev. 27, 2 (Apr.), 24-36.
    • (1997) ACM Comput. Commun. Rev. , vol.27 , Issue.2 APR. , pp. 24-36
    • Rizzo, L.1
  • 17
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • SONG, D. X., AND PERRIG, A. 2001. Advanced and authenticated marking schemes for IP traceback. In Proceedings of the IEEE INFOCOM. IEEE Computer Society Press, Los Alamitos, Calif.
    • (2001) Proceedings of the IEEE INFOCOM
    • Song, D.X.1    Perrig, A.2
  • 18
    • 0037810705 scopus 로고    scopus 로고
    • Pi: A path identification mechanism to defend against DDoS attacks
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • YAAR, A., PERRIG, A., AND SONG, D. 2003. Pi: A path identification mechanism to defend against DDoS attacks. In Proceedings of the IEEE Security and Privacy Symposium. IEEE Computer Society Press, Los Alamitos, Calif.
    • (2003) Proceedings of the IEEE Security and Privacy Symposium
    • Yaar, A.1    Perrig, A.2    Song, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.