메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages

Tabu marking scheme for IP traceback

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED DENIAL-OF-SERVICE (DDOS) ATTACKS; PROBABILISTIC PACKET MARKING (PPM) SCHEME; TABU MARKING SCHEME;

EID: 33746280838     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IPDPS.2005.421     Document Type: Conference Paper
Times cited : (8)

References (25)
  • 2
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • D. Song and A. Perrig, "Advanced and authenticated marking schemes for IP traceback," Proceedings of IEEE INFOCOM 2001, pp. 878-886.
    • (2001) Proceedings of IEEE INFOCOM , pp. 878-886
    • Song, D.1    Perrig, A.2
  • 5
    • 0035010963 scopus 로고    scopus 로고
    • On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
    • K. Park and H. Lee, "On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack," Proceedings of IEEE INFOCOM 2001, pp. 338-347.
    • (2001) Proceedings of IEEE INFOCOM , pp. 338-347
    • Park, K.1    Lee, H.2
  • 6
    • 0036036842 scopus 로고    scopus 로고
    • Tradeoffs in probabilistic packet marking for IP traceback
    • May 19-21
    • M. Adler, "Tradeoffs in probabilistic packet marking for IP traceback," 34th ACM Symposium Theory of Computing (STOC), May 19-21, 2002, pp. 407-418.
    • (2002) 34th ACM Symposium Theory of Computing (STOC) , pp. 407-418
    • Adler, M.1
  • 7
    • 0002624024 scopus 로고    scopus 로고
    • Tracing anonymous packets to their approximate source
    • New Orleans, USA, Dec.
    • Hal Burch and Bill Cheswick, "Tracing anonymous packets to their approximate source," 14th Systems Administration Conference, New Orleans, USA, Dec. 2000, pp. 313-322.
    • (2000) 14th Systems Administration Conference , pp. 313-322
    • Burch, H.1    Cheswick, B.2
  • 8
    • 85084163540 scopus 로고    scopus 로고
    • CenterTrack: An IP overlay network for tracking DoS floods
    • August
    • Robert Stone, "CenterTrack: an IP overlay network for tracking DoS floods," 9th USENIX Security Symposium, August 2000.
    • (2000) 9th USENIX Security Symposium
    • Stone, R.1
  • 9
    • 8344278876 scopus 로고    scopus 로고
    • ICMP traceback messages
    • March
    • Steven M. Bellovin, "ICMP Traceback messages," Internet Draft, March 2001.
    • (2001) Internet Draft
    • Bellovin, S.M.1
  • 12
    • 3543126644 scopus 로고    scopus 로고
    • Large-scale IP trace-back in high-speed Internet: Practical techniques and theoretical foundation
    • Berkeley, California, USA
    • J. Li, M. Sung, J. Xu and L. Li, "Large-scale IP trace-back in high-speed Internet: practical techniques and theoretical foundation," IEEE symposium on security and privacy (S&P) 2004, Berkeley, California, USA, pp. 115-129.
    • (2004) IEEE Symposium on Security and Privacy (S&P) , pp. 115-129
    • Li, J.1    Sung, M.2    Xu, J.3    Li, L.4
  • 13
    • 0003334329 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating Denial of Service attacks which employ IP source address spoofing
    • D. Senie, "Network ingress filtering: defeating Denial of Service attacks which employ IP source address spoofing," RFC 2827, 5 2000.
    • (2000) RFC , vol.2827 , pp. 5
    • Senie, D.1
  • 17
    • 0037810705 scopus 로고    scopus 로고
    • Pi: A path identification mechanism to defend against DDoS attacks
    • Berkeley, California, USA
    • A. Yaar, A. Perrig and D. Song, "Pi: a path identification mechanism to defend against DDoS attacks," IEEE symposium on security and privacy (S&P) 2003, Berkeley, California, USA, pp. 93-107.
    • (2003) IEEE Symposium on Security and Privacy (S&P) , pp. 93-107
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 18
    • 3543059601 scopus 로고    scopus 로고
    • StackPi: A new defensive mechnamism against IP spoofing and DDoS attacks
    • Carnegie Mellon University, February
    • A. Perrig, D. Song and A. Yaar, "StackPi: a new defensive mechnamism against IP spoofing and DDoS attacks," Technical Report CMU-CS-02-208, Carnegie Mellon University, February 2003.
    • (2003) Technical Report , vol.CMU-CS-02-208
    • Perrig, A.1    Song, D.2    Yaar, A.3
  • 19
    • 17644411571 scopus 로고    scopus 로고
    • Hop-count filtering: An effective defense against spoofed DDoS traffic
    • October 27-31, Washington, DC, USA
    • C. Jin, H. Wang and K. G. Shin, "Hop-count filtering: an effective defense against spoofed DDoS traffic," 10th ACM Conference on Computer and Communications Security (CCS), October 27-31, 2003, Washington, DC, USA, pp. 30-41.
    • (2003) 10th ACM Conference on Computer and Communications Security (CCS) , pp. 30-41
    • Jin, C.1    Wang, H.2    Shin, K.G.3
  • 20
    • 3543097593 scopus 로고    scopus 로고
    • SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks
    • Berkeley, California, USA
    • A. Yaar, A. Perrig and D. Song, "SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks," IEEE symposium on security and privacy (S&P) 2004, Berkeley, California, USA, pp. 130-143.
    • (2004) IEEE Symposium on Security and Privacy (S&P) , pp. 130-143
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 23
    • 0003196107 scopus 로고    scopus 로고
    • RFC 2104 - HMAC: Key-ed hashing for message authentication
    • Feb.
    • H. Krawczyk, M. Bellare and R. Canetti, "RFC 2104 - HMAC: Key-ed hashing for message authentication," Internet RFC 2104, Feb. 1997
    • (1997) Internet RFC , vol.2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 25
    • 0036947484 scopus 로고    scopus 로고
    • Beyond folklore: Observations on fragmented traffic
    • December
    • C. Shannon, D. Moore and K. C. Claffy, "Beyond folklore: observations on fragmented traffic," IEEE/ACM Transactions on Networkings, Vol. 10, No. 6, December 2002, pp. 709-720.
    • (2002) IEEE/ACM Transactions on Networkings , vol.10 , Issue.6 , pp. 709-720
    • Shannon, C.1    Moore, D.2    Claffy, K.C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.