메뉴 건너뛰기




Volumn 51, Issue 10, 2007, Pages 2677-2700

On deterministic packet marking

Author keywords

DDoS attacks; IP traceback; Security

Indexed keywords

BANDWIDTH; INTERNET SERVICE PROVIDERS; REAL TIME SYSTEMS; TELECOMMUNICATION SERVICES; USER INTERFACES;

EID: 34247634501     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2006.11.020     Document Type: Article
Times cited : (89)

References (41)
  • 1
    • 34247604232 scopus 로고    scopus 로고
    • P. Ferguson, D. Senie, Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing, RFC 2827, May 2000.
  • 4
    • 34247628162 scopus 로고    scopus 로고
    • C. Morrow, B. Gemberling, How to track a DoS attack (nanog post) [Online]. .
  • 5
    • 85084161486 scopus 로고    scopus 로고
    • D. Moore, G.M. Voelker, S. Savage, Inferring Internet denial of service activity, in: Proc. 10th USENIX Security Symposium, 2001, pp. 9-22.
  • 6
    • 0036804084 scopus 로고    scopus 로고
    • Defending against flooding-based distributed denial-of-service attacks: a tutorial
    • Chang R.K.C. Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Commun. Mag. 40 10 (2002) 42-51
    • (2002) IEEE Commun. Mag. , vol.40 , Issue.10 , pp. 42-51
    • Chang, R.K.C.1
  • 8
    • 34247597562 scopus 로고    scopus 로고
    • S.M. Bellovin, ICMP traceback messages, IETF Draft, March 2000.
  • 9
    • 34247574942 scopus 로고    scopus 로고
    • S.F. Wu, L. Zhang, D. Massey, A. Mankin, Intention-driven ICMP trace-back, IETF Draft, February 2001 [Online]. .
  • 10
    • 84950242640 scopus 로고    scopus 로고
    • S.F. Wu, L. Zhang, D. Massey, A. Mankin, On design and evaluation of intention-driven ICMP traceback, in: Proc. 10th Inter. Conf. on Computer Comm. and Networks, October 2001, pp. 159-165.
  • 12
    • 0034997397 scopus 로고    scopus 로고
    • D.X. Song, A. Perrig, Advanced and authenticated marking schemes for IP traceback, in: Proc. INFOCOM 2001, April 2001, vol. 2, pp. 878-886.
  • 14
    • 3142749817 scopus 로고    scopus 로고
    • Probabilistic packet parking with non-preemptive compensation
    • Tseng Y.K., and Hsieh H.H.C.W.S. Probabilistic packet parking with non-preemptive compensation. IEEE Commun. Lett. 8 6 (2004) 359-361
    • (2004) IEEE Commun. Lett. , vol.8 , Issue.6 , pp. 359-361
    • Tseng, Y.K.1    Hsieh, H.H.C.W.S.2
  • 15
    • 0037810705 scopus 로고    scopus 로고
    • A. Yaar, A. Perrig, D. Song, Pi: a path identification mechanism to defend against DDoS attacks, in: Proc. 2003 Symposium on Security and Privacy, 2003, May 2003, pp. 93-107.
  • 16
    • 25844461391 scopus 로고    scopus 로고
    • A. Yaar, A. Perrig, D. Song, FIT: fast Internet traceback, in: INFOCOM 2005, March 2005, vol. 2, pp. 1395-1406.
  • 17
    • 0038011192 scopus 로고    scopus 로고
    • M.T. Goodrich, Efficient packet marking for large-scale IP traceback, in: CCS'02: Proc. of the 9th ACM Conf. on Comp. and Comm. Sec., November 2002, pp. 117-126.
  • 18
    • 33751257165 scopus 로고    scopus 로고
    • A practical and robust inter-domain marking scheme for IP traceback
    • Gao Z., and Ansari N. A practical and robust inter-domain marking scheme for IP traceback. Computer Networks 51 3 (2007) 732-750
    • (2007) Computer Networks , vol.51 , Issue.3 , pp. 732-750
    • Gao, Z.1    Ansari, N.2
  • 19
    • 0036947597 scopus 로고    scopus 로고
    • Single-packet IP traceback
    • Snoeren A.C., et al. Single-packet IP traceback. IEEE/ACM Trans. Networking 10 6 (2002) 721-734
    • (2002) IEEE/ACM Trans. Networking , vol.10 , Issue.6 , pp. 721-734
    • Snoeren, A.C.1
  • 20
    • 0036329754 scopus 로고    scopus 로고
    • Tracing network attacks to their sources
    • Baba T., and Matsuda S. Tracing network attacks to their sources. IEEE Internet Comput. 6 2 (2002) 20-26
    • (2002) IEEE Internet Comput. , vol.6 , Issue.2 , pp. 20-26
    • Baba, T.1    Matsuda, S.2
  • 21
    • 84893121153 scopus 로고    scopus 로고
    • S. Matsuda, T. Baba, A. Hayakawa, T. Nakamura, Design and implementation of unauthorized access tracing system, in: Proc. of the 2002 Symposium on Applications and the Internet, 2002 (SAINT 2002), January/February 2002, pp. 74-81.
  • 22
    • 3543126644 scopus 로고    scopus 로고
    • J. Li, M. Sung, J. Xu, L. Li, Large-scale IP traceback in high-speed Internet: practical techniques and theoretical foundation, in: Proc. 2004 IEEE Symposium on Security and Privacy, May 2004, pp. 115-129.
  • 23
    • 85084163540 scopus 로고    scopus 로고
    • R. Stone, Centertrack: an IP overlay network for tracking DoS floods, in: Proc. of 9th USENIX Security Symposium, August 2000.
  • 24
    • 84962214242 scopus 로고    scopus 로고
    • H. Chang et al., Deciduous: decentralized source identification for network-based intrusions, in: Proc. of 6th IFIP/IEEE International Symposium on Integrated Net. Management, May 1999, pp. 701-714.
  • 25
    • 84962278506 scopus 로고    scopus 로고
    • H. Chang et al., Design and implementation of a real-time decentralized source identification system for untrusted ip packets, in: Proc. of the DARPA Information Survivability Conference & Exposition, January 2000, vol. 2, pp. 100-111.
  • 26
    • 85011016678 scopus 로고    scopus 로고
    • H. Burch, B. Cheswick, Tracing anonymous packets to their approximate source, in: Proc. of 2000 USENIX LISA Conference, December 2000, pp. 319-327.
  • 27
    • 0038059205 scopus 로고    scopus 로고
    • IP traceback with deterministic packet marking
    • Belenky A., and Ansari N. IP traceback with deterministic packet marking. IEEE Commun. Lett. 7 4 (2003) 162-164
    • (2003) IEEE Commun. Lett. , vol.7 , Issue.4 , pp. 162-164
    • Belenky, A.1    Ansari, N.2
  • 28
    • 34247647755 scopus 로고    scopus 로고
    • A. Belenky, IP Traceback with Deterministic Packet Marking (DPM), Ph.D. dissertation, NJIT, Newark, August 2003.
  • 29
    • 0142199483 scopus 로고    scopus 로고
    • A. Belenky, N. Ansari, Tracing multiple attackers with deterministic packet marking (DPM), in: Proc. of IEEE PacRim, August 2003, vol. 1, pp. 49-52.
  • 30
    • 0036947484 scopus 로고    scopus 로고
    • Beyond folklore: observations on fragmented traffic
    • Shannon C., Moore D., and Claffy K.C. Beyond folklore: observations on fragmented traffic. IEEE/ACM Trans. Networking 10 6 (2002) 709-720
    • (2002) IEEE/ACM Trans. Networking , vol.10 , Issue.6 , pp. 709-720
    • Shannon, C.1    Moore, D.2    Claffy, K.C.3
  • 31
    • 34247575955 scopus 로고    scopus 로고
    • J. Mogul, S. Deering, Path MTU discovery, RFC 1191, November 1990.
  • 32
    • 34247561493 scopus 로고    scopus 로고
    • J. Postel, Internet protocol, RFC 791, September 1981.
  • 33
    • 34247622553 scopus 로고    scopus 로고
    • D.D. Clark, IP datagram reassembly algorithms, RFC 815, July 1982.
  • 34
    • 34247619047 scopus 로고    scopus 로고
    • F. Baker, Requirements for IP version 4 routers, RFC 1812, June 1995.
  • 36
    • 34247631377 scopus 로고    scopus 로고
    • R. Braden, Requirements for Internet hosts - communication layers, RFC 1122, October 1989.
  • 37
    • 34247566300 scopus 로고    scopus 로고
    • S. McCreary, C.K. Claffy, Trends in wide area IP traffic patterns, in: ITC Specialist Seminar, CAIDA, 2000.
  • 40
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of-service attacks
    • Paxson V. An analysis of using reflectors for distributed denial-of-service attacks. Comput. Commun. Rev. 31 3 (2001) 38-47
    • (2001) Comput. Commun. Rev. , vol.31 , Issue.3 , pp. 38-47
    • Paxson, V.1
  • 41
    • 34247601267 scopus 로고    scopus 로고
    • IBM TotalStorage Product Guide, IBM Systems Group, October 2006 [Online]. .


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.