메뉴 건너뛰기




Volumn 50, Issue 18, 2006, Pages 3536-3549

Tabu marking scheme to speedup IP traceback

Author keywords

Coupon collection problem; Distributed denial of service attacks; IP traceback; Network security; Probabilistic packet marking

Indexed keywords

PACKET NETWORKS; PROBABILISTIC LOGICS; PROBLEM SOLVING; ROUTERS; SECURITY OF DATA; TELECOMMUNICATION TRAFFIC;

EID: 33749056600     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2006.02.004     Document Type: Article
Times cited : (18)

References (30)
  • 1
    • 0033650584 scopus 로고    scopus 로고
    • S. Savage, D. Wetherall, A. Karlin, T. Anderson, Practical network support for IP traceback, in: Proceedings of ACM SIGCOMM, 2000, Stockholm, Sweden, pp. 295-306.
  • 2
    • 0034997397 scopus 로고    scopus 로고
    • D. Song, A. Perrig, Advanced and authenticated marking schemes for IP traceback, in: Proceedings of IEEE INFOCOM, 2001, pp. 878-886.
  • 3
    • 33749060709 scopus 로고    scopus 로고
    • D. Dean, M. Franklin, A. Stubblefield, An algebraic approach to IP traceback, in: Networks and Distributed System Security Symposium (NDSS), 2001, pp. 3-12.
  • 4
    • 0038011192 scopus 로고    scopus 로고
    • M.T. Goodrich, Efficient packet marking for large-scale IP traceback, in: 9th ACM Conference on Computer and Communications Security (CCS), 2002, Washington DC, USA, pp. 117-126.
  • 5
    • 0035010963 scopus 로고    scopus 로고
    • K. Park, H. Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, in: Proceedings of IEEE INFOCOM, 2001, pp. 338-347.
  • 6
    • 0036036842 scopus 로고    scopus 로고
    • M. Adler, Tradeoffs in probabilistic packet marking for IP traceback, in: 34th ACM Symposium Theory of Computing (STOC), May 19-21, 2002, pp. 407-418.
  • 7
    • 33746280838 scopus 로고    scopus 로고
    • M. Ma, Tabu marking scheme for IP traceback, in: 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS), Denver, CO, April 2005.
  • 8
    • 33749076717 scopus 로고    scopus 로고
    • H. Burch, B. Cheswick, Tracing anonymous packets to their approximate source, 14th Systems Administration Conference, New Orleans, LA, USA, December 2000, pp. 313-322.
  • 9
    • 85084163540 scopus 로고    scopus 로고
    • R. Stone, CenterTrack: an IP overlay network for tracking DoS floods, in: 9th USENIX Security Symposium, August 2000.
  • 10
    • 33749060029 scopus 로고    scopus 로고
    • S.M. Bellovin, ICMP Traceback messages, Internet Draft, March 2001.
  • 11
    • 84950242640 scopus 로고    scopus 로고
    • A. Mankin, D. Massey, C.-L. Wu, S. Felix Wu, L. Zhang, On design and evaluation of "intention-driven" ICMP traceback, in: Proceedings of the 10th International Conference on Computer Communications and Networks (ICCCN) 2001, pp. 159-165.
  • 12
    • 0034775309 scopus 로고    scopus 로고
    • A.C. Snoeren, C. Partridge, L.A. Sanchez, C.E. Jones, F. Tchakountio, B. Schwartz, S.T. Kent, W.T. Strayer, Hash-based IP traceback, in: Proceedings of ACM SIGCOMM, San Diego, CA, USA, August 27-31, 2001, pp. 3-14.
  • 13
    • 3543126644 scopus 로고    scopus 로고
    • J. Li, M. Sung, J. Xu, L. Li, Large-scale IP traceback in high-speed Internet: practical techniques and theoretical foundation, in: IEEE Symposium on Security and Privacy (S&P) 2004, Berkeley, CA, US., pp. 115-129.
  • 14
    • 33749053241 scopus 로고    scopus 로고
    • D. Senie, Network ingress filtering: defeating Denial of Service attacks which employ IP source address spoofing, RFC 2827, 5, 2000.
  • 15
    • 0036349004 scopus 로고    scopus 로고
    • J. Li, J. Mirkovic, M. Wang, P. Reiher, L. Zhang, SAVE: source address validity enforcement protocol, in: Proceedings of IEEE INFOCOM, 2002, pp. 1557-1566.
  • 17
    • 33749040737 scopus 로고    scopus 로고
    • J. Ioannidis, S.M. Bellovin, Implementing pushback: router-based defense against DDoS attacks, in: Network and Distributed System Security Symposium (NDSS), 2002.
  • 18
    • 33744945767 scopus 로고    scopus 로고
    • A. Keromytis, V. Misra, D. Rubenstein, SOS: secure overlay services, in: Proceedings of ACM SIGCOMM, August 2002, pp. 61-72.
  • 19
    • 35048820228 scopus 로고    scopus 로고
    • D. Andersen, Mayday: distributed filtering for Internet services, in: Proceedings of USITS, 2003.
  • 20
    • 0037810705 scopus 로고    scopus 로고
    • A. Yaar, A. Perrig, D. Song, Pi: a path identification mechanism to defend against DDoS attacks, in: IEEE Symposium on Security and Privacy (S&P) 2003, Berkeley, CA, USA, pp. 93-107.
  • 21
    • 33749046554 scopus 로고    scopus 로고
    • A. Perrig, D. Song, A. Yaar, StackPi: a new defensive mechanism against IP spoofing and DDoS attacks, Technical Report CMU-CS-02-208, Carnegie Mellon University, February 2003.
  • 22
    • 17644411571 scopus 로고    scopus 로고
    • C. Jin, H. Wang, K.G. Shin, Hop-count filtering: an effective defense against spoofed DDoS traffic, in: 10th ACM Conference on Computer and Communications Security (CCS) 2003, October 27-31, 2003, Washington, DC, USA, pp. 30-41.
  • 23
    • 3543097593 scopus 로고    scopus 로고
    • A. Yaar, A. Perrig, D. Song, SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks, in: IEEE Symposium on Security and Privacy (S&P) 2004, Berkeley, CA, USA, pp. 130-143.
  • 25
    • 33749076716 scopus 로고    scopus 로고
    • H. Krawczyk, M. Bellare, R. Canetti, RFC 2104-HMAC: Key-ed hashing for message authentication, Internet RFC 2104, February 1997.
  • 27
    • 85084163167 scopus 로고    scopus 로고
    • T.M. Gil, M. Poletter, Multops: a data structure for bandwidth attack detection, in: Proceedings of USENIX Security Symposium, Washington, DC, August 2001.
  • 28
    • 0036343692 scopus 로고    scopus 로고
    • H. Wang, D. Zhang, K.G. Shin, Detecting SYN flooding attacks, in: Proceedings of IEEE INFOCOM, vol. 3, June 2002, New York City, NY, pp. 1530-1539.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.