메뉴 건너뛰기




Volumn 16, Issue 1, 2008, Pages 15-24

Probabilistic packet marking for large-scale IP traceback

Author keywords

Associate addresses; Checksum cords; Distributed denial of service (DDOS); IP; Probabilistic packet marking; Traceback

Indexed keywords

INTERNET PROTOCOLS; LARGE SCALE SYSTEMS; ROUTERS;

EID: 40749152296     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2007.910594     Document Type: Article
Times cited : (108)

References (14)
  • 2
    • 0036329754 scopus 로고    scopus 로고
    • Tracing network attacks to their sources
    • T. Baba and S. Matsuda, "Tracing network attacks to their sources," IEEE Internet Computing, vol. 6, no. 2, pp. 20-26, 2002.
    • (2002) IEEE Internet Computing , vol.6 , Issue.2 , pp. 20-26
    • Baba, T.1    Matsuda, S.2
  • 3
    • 0004194675 scopus 로고    scopus 로고
    • work in Progress, Internet Draft draft-bellovin-itrace-00.txt, Mar
    • S. M. Bellovin, "ICMP traceback messages," work in Progress, Internet Draft draft-bellovin-itrace-00.txt, Mar. 2000.
    • (2000) ICMP traceback messages
    • Bellovin, S.M.1
  • 4
    • 85011016678 scopus 로고    scopus 로고
    • Tracing anonymous packets to their approximate source
    • H. Burch and B. Cheswick, "Tracing anonymous packets to their approximate source," in Proc. Usenix LISA (New Orleans) Conf., 2000, pp. 313-322.
    • (2000) Proc. Usenix LISA (New Orleans) Conf , pp. 313-322
    • Burch, H.1    Cheswick, B.2
  • 9
    • 25844469597 scopus 로고    scopus 로고
    • You can run, but you can't hide: An effective statistical methodology to trace back DDOS attackers
    • Sep
    • T. K. T. Law, D. K. Y. Yau, and J. C. S. Lui, "You can run, but you can't hide: An effective statistical methodology to trace back DDOS attackers," IEEE Trans. Parallel Distrib. Syst., vol. 16, no. 9, pp. 799-813, Sep. 2005.
    • (2005) IEEE Trans. Parallel Distrib. Syst , vol.16 , Issue.9 , pp. 799-813
    • Law, T.K.T.1    Yau, D.K.Y.2    Lui, J.C.S.3
  • 13
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • D. Song and A. Perrig, "Advanced and authenticated marking schemes for IP traceback," in Proc. IEEE INFOCOM, 2001, pp. 878-886.
    • (2001) Proc. IEEE INFOCOM , pp. 878-886
    • Song, D.1    Perrig, A.2
  • 14
    • 85084163540 scopus 로고    scopus 로고
    • Centertrack: An IP overlay network for tracking DoS floods
    • Denver, CO, Aug
    • R. Stone, "Centertrack: An IP overlay network for tracking DoS floods," in Proc. 9th USENIX Security Symp., Denver, CO, Aug. 2000.
    • (2000) Proc. 9th USENIX Security Symp
    • Stone, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.