메뉴 건너뛰기




Volumn , Issue , 2010, Pages

An effective method for defense against IP spoofing attack

Author keywords

IP spoofing attack; Network security; Traceroute; Trusted node

Indexed keywords

ADJACENT NODES; DISTRIBUTED DENIAL OF SERVICE ATTACK; ECONOMIC LOSS; IP SPOOFING; NETWORK SERVICES; SECURITY THREATS; TRACEROUTE; TRUSTED NODE;

EID: 78549248854     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WICOM.2010.5601287     Document Type: Conference Paper
Times cited : (10)

References (9)
  • 1
    • 33750711125 scopus 로고    scopus 로고
    • Profiling internet backbone traffic: Behavior models and applications
    • DOI 10.1145/1090191.1080112
    • K. Xu, Z. Zhang, and S. Bhattacharya. "Profiling Internet Backbone Traffic: Behavior Models and Applications," Proc. of ACM SIGCOMM, Philadelphia, PA, USA, pp. 169-180, August 2005. (Pubitemid 46323502)
    • (2005) Computer Communication Review , vol.35 , Issue.4 , pp. 169-180
    • Xu, K.1    Zhang, Z.-L.2    Bhattacharyya, S.3
  • 7
    • 0036329754 scopus 로고    scopus 로고
    • Tracing network attacks to their sources
    • T. Baba and S. Matsuda, "Tracing network attacks to their sources," IEEE Internet Computing, vol. 6, pp. 20-26, 2002.
    • (2002) IEEE Internet Computing , vol.6 , pp. 20-26
    • Baba, T.1    Matsuda, S.2
  • 9
    • 0002000920 scopus 로고    scopus 로고
    • Denial-of-service attacks rip the internet
    • April
    • L. Garber, "Denial-of-service attacks rip the Internet," IEEE Computer, vol. 33, pp. 12-17, April 2000.
    • (2000) IEEE Computer , vol.33 , pp. 12-17
    • Garber, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.