메뉴 건너뛰기




Volumn 1, Issue 3, 2003, Pages 24-31

IP traceback: A new denial-of-service deterrent?

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ATTACKS; INTERNET CONTROL MESSAGE PROTOCOL (ICMP); INTERNET PROTOCOL (IP); NETWORK ROUTERS;

EID: 3042825073     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSECP.2003.1203219     Document Type: Review
Times cited : (59)

References (22)
  • 4
    • 0034776786 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
    • ACM Press
    • W. Lee and K. Park, "On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets," Proc. SIGCOMM, ACM Press, 2001, pp. 15-26.
    • (2001) Proc. SIGCOMM , pp. 15-26
    • Lee, W.1    Park, K.2
  • 5
    • 0003334329 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
    • May
    • P. Ferguson and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing," Internet Eng. Task Force RFC 2827, May 2000; www.ietf.org/rfc/rfc2827.txt.
    • (2000) Internet Eng. Task Force RFC , vol.2827
    • Ferguson, P.1    Senie, D.2
  • 6
    • 0036329754 scopus 로고    scopus 로고
    • Tracing network attacks to their sources
    • T. Baba and S. Matsuda, "Tracing Network Attacks to Their Sources," IEEE Internet Computing, vol. 6, no. 3, 2002, pp. 20-26.
    • (2002) IEEE Internet Computing , vol.6 , Issue.3 , pp. 20-26
    • Baba, T.1    Matsuda, S.2
  • 7
    • 85084163540 scopus 로고    scopus 로고
    • CenterTrack: An IP overlay network for tracking DoS floods
    • Usenix Assoc.
    • R. Stone, "CenterTrack: An IP Overlay Network for Tracking DoS Floods," Proc. 9th Usenix Security Symp., Usenix Assoc., 2000, pp. 199-212.
    • (2000) Proc. 9th Usenix Security Symp. , pp. 199-212
    • Stone, R.1
  • 8
    • 85011016678 scopus 로고    scopus 로고
    • Tracing anonymous packets to their approximate source
    • Usenix Assoc.
    • H. Burch and B. Cheswick, "Tracing Anonymous Packets to Their Approximate Source," Proc. 14th Conf. Systems Administration, Usenix Assoc., 2000, pp. 313-322.
    • (2000) Proc. 14th Conf. Systems Administration , pp. 313-322
    • Burch, H.1    Cheswick, B.2
  • 9
    • 0036947597 scopus 로고    scopus 로고
    • Single-packet IP traceback
    • A.C. Snoeren et al., "Single-Packet IP Traceback," IEEE/ACM Trans. Networking, vol. 10, no. 6, 2002, pp. 721-734.
    • (2002) IEEE/ACM Trans. Networking , vol.10 , Issue.6 , pp. 721-734
    • Snoeren, A.C.1
  • 10
    • 2542523334 scopus 로고    scopus 로고
    • ICMP traceback messages
    • Internet Eng. Task Force, work in progress
    • S. Bellovin, M. Leech, and T. Taylor, "ICMP Traceback Messages," Internet Draft, Internet Eng. Task Force, 2003; work in progress.
    • (2003) Internet Draft
    • Bellovin, S.1    Leech, M.2    Taylor, T.3
  • 11
    • 84950242640 scopus 로고    scopus 로고
    • On design and evaluation of 'intention-driven' ICMP traceback
    • IEEE CS Press
    • A. Mankin et al., "On Design and Evaluation of 'Intention-Driven' ICMP Traceback," Proc. IEEE Int'l Conf. Computer Comm. and Networks, IEEE CS Press, 2001. pp. 159-165.
    • (2001) Proc. IEEE Int'l Conf. Computer Comm. and Networks , pp. 159-165
    • Mankin, A.1
  • 12
    • 0035010963 scopus 로고    scopus 로고
    • On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
    • IEEE CS Press
    • W. Lee and K. Park, "On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack," Proc. IEEE INFOCOM, IEEE CS Press, 2001, pp. 338-347.
    • (2001) Proc. IEEE INFOCOM , pp. 338-347
    • Lee, W.1    Park, K.2
  • 13
    • 0036036842 scopus 로고    scopus 로고
    • Tradeoffs in probabilistic packet marking for IP traceback
    • ACM Press
    • M. Adler, "Tradeoffs in Probabilistic Packet Marking for IP Traceback," Proc. 34th ACM Symp. Theory of Computing, ACM Press, 2002, pp. 407-418.
    • (2002) Proc. 34th ACM Symp. Theory of Computing , pp. 407-418
    • Adler, M.1
  • 14
    • 0035361712 scopus 로고    scopus 로고
    • Network support for IP traceback
    • S. Savage et al., "Network Support for IP Traceback," IEEE/ACM Trans. Networking, vol. 9, no. 3, 2001, pp. 226-237.
    • (2001) IEEE/ACM Trans. Networking , vol.9 , Issue.3 , pp. 226-237
    • Savage, S.1
  • 16
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • IEEE CS Press
    • D. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," Proc. IEEE INFOCOM, IEEE CS Press, 2001, pp. 878-886.
    • (2001) Proc. IEEE INFOCOM , pp. 878-886
    • Song, D.1    Perrig, A.2
  • 19
    • 0037224225 scopus 로고    scopus 로고
    • IP traceback using header compression
    • H. Aljifri, M. Smets, and A. Pons, "IP Traceback Using Header Compression," Computers & Security, vol. 22, no. 2, 2003, pp. 136-151.
    • (2003) Computers & Security , vol.22 , Issue.2 , pp. 136-151
    • Aljifri, H.1    Smets, M.2    Pons, A.3
  • 20
    • 0003314621 scopus 로고
    • Internet protocol
    • Sept.
    • J. Postel, "Internet Protocol," Internet Eng. Task Force RFC 791, Sept. 1981; www.ietf.org/rfc/rfc0791.txt.
    • (1981) Internet Eng. Task Force RFC , vol.791
    • Postel, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.