메뉴 건너뛰기




Volumn 1, Issue 1-2, 2006, Pages 54-61

A taxonomy of internet traceback

Author keywords

attack attribution; DDoS; forensics; IP traceback; stepping stone; worms

Indexed keywords


EID: 70449498446     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/ijsn.2006.010823     Document Type: Article
Times cited : (20)

References (47)
  • 2
    • 0038059205 scopus 로고    scopus 로고
    • IP traceback with deterministic packet marking
    • Belenky, A. and Ansari, N. (2003) ‘IP traceback with deterministic packet marking’, IEEE Communication Letters, Vol. 41, No.7, pp.162–164.
    • (2003) IEEE Communication Letters , vol.41 , Issue.7 , pp. 162-164
    • Belenky, A.1    Ansari, N.2
  • 4
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Bloom, B.H. (1970) ‘Space/time trade-offs in hash coding with allowable errors’, Communications of ACM, Vol. 13, No. 7, pp.422–426.
    • (1970) Communications of ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 5
    • 85011016678 scopus 로고    scopus 로고
    • Tracing anonymous packets to their approximate source
    • December
    • Burch, H. and Cheswick, B. (2000) ‘Tracing anonymous packets to their approximate source’, Proceedings of the USENIX LISA, December.
    • (2000) Proceedings of the USENIX LISA
    • Burch, H.1    Cheswick, B.2
  • 8
    • 84952968771 scopus 로고    scopus 로고
    • Cisco Systems, Inc. (2004) ‘IP source tracker’, Available at: http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/120newft/120limit/120s/120s21/ipst.pdf.
    • (2004) IP source tracker
  • 12
    • 84877734993 scopus 로고    scopus 로고
    • ISP security – real world techniques
    • Greene, B.R., Morrow, L.C. and Gemberling, B.W. (2001) ‘ISP security – real world techniques’, NANOG23 Meeting, Available at: http://www.nanog.org/mtg-0110/greene.html, October.
    • (2001) NANOG23 Meeting , vol.October
    • Greene, B.R.1    Morrow, L.C.2    Gemberling, B.W.3
  • 14
    • 84952961851 scopus 로고    scopus 로고
    • Implementing border router packet marking in today’s internet
    • Hamadeh, I. and Kesidis, G. (2003b) ‘Implementing border router packet marking in today’s internet’, Technical Report: CSE-03-014, August.
    • (2003) Technical Report: CSE-03-014 , vol.August
    • Hamadeh, I.1    Kesidis, G.2
  • 25
    • 0038742366 scopus 로고    scopus 로고
    • Adjusted probabilistic packet marking for IP traceback
    • Peng, T., Leckie, C. and Ramamohanarao, K. (2002) ‘Adjusted probabilistic packet marking for IP traceback’, Networking 2002, May.
    • (2002) Networking 2002 , vol.May
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 33
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • Song, D.X. and Perrig, A. (2001) ‘Advanced and authenticated marking schemes for IP traceback’, Proceedings of the IEEE INFOCOM, April.
    • (2001) Proceedings of the IEEE INFOCOM , vol.April
    • Song, D.X.1    Perrig, A.2
  • 46
    • 84952970616 scopus 로고    scopus 로고
    • A border gateway router is an ISP backbone router that is adjacent to one or more backbone routers that could belong to a customer or another ISP
    • A border gateway router is an ISP backbone router that is adjacent to one or more backbone routers that could belong to a customer or another ISP.
  • 47
    • 84952974745 scopus 로고    scopus 로고
    • A tracking node is a sophisticated device that could perform routing, analysis and filtering. It can examine datagrams, drop them or forward them to other routers
    • A tracking node is a sophisticated device that could perform routing, analysis and filtering. It can examine datagrams, drop them or forward them to other routers.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.