메뉴 건너뛰기




Volumn 42, Issue , 2014, Pages 60-69

ICMP based IP traceback with negligible overhead for highly distributed reflector attack using bloom filters

Author keywords

Bloom filter; Denial of service attack; Distributed reflector attack; IP traceback; Reverse iTrace

Indexed keywords

BLOOM FILTERS; DENIAL OF SERVICE ATTACKS; DISTRIBUTED REFLECTORS; IP TRACEBACK; REVERSE ITRACE;

EID: 84900613991     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2014.01.003     Document Type: Article
Times cited : (24)

References (27)
  • 1
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of-service attacks
    • Vern Paxson An analysis of using reflectors for distributed denial-of-service attacks ACM SIGCOMM Comput. Commun. Rev. 31 2001 38 47
    • (2001) ACM SIGCOMM Comput. Commun. Rev. , vol.31 , pp. 38-47
    • Paxson, V.1
  • 2
    • 84900626830 scopus 로고    scopus 로고
    • A rank correlation based detection against distributed reflection DoS attacks
    • Wei Wei, Feng Chen, Yingjie Xia, and Guang Jin A rank correlation based detection against distributed reflection DoS attacks Comput. Commun. 2013 1 3
    • (2013) Comput. Commun. , pp. 1-3
    • Wei, W.1    Chen, F.2    Xia, Y.3    Jin, G.4
  • 4
    • 84900614825 scopus 로고    scopus 로고
    • Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems
    • P. Arun, Raj Kumar, and S. Selvakumar Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems Comput. Commun. 2012
    • (2012) Comput. Commun.
    • Arun, P.1    Kumar, R.2    Selvakumar, S.3
  • 6
    • 33745917123 scopus 로고    scopus 로고
    • Distributed packet pairing for reflector based DDoS attack mitigation
    • Basheer Al-Duwairi, and G. Manimaran Distributed packet pairing for reflector based DDoS attack mitigation Comput. Commun. 29 2006 2269 2280
    • (2006) Comput. Commun. , vol.29 , pp. 2269-2280
    • Al-Duwairi, B.1    Manimaran, G.2
  • 7
    • 49649095338 scopus 로고    scopus 로고
    • Detecting DRDoS attacks by a simple response packet confirmation mechanism
    • T. Hiroshi, K. Ohta, A. Yamamoto, N. Ansari, Y. Waizumi, and Y. Nemoto Detecting DRDoS attacks by a simple response packet confirmation mechanism Comput. Commun. 31 14 2008 3299 3306
    • (2008) Comput. Commun. , vol.31 , Issue.14 , pp. 3299-3306
    • Hiroshi, T.1    Ohta, K.2    Yamamoto, A.3    Ansari, N.4    Waizumi, Y.5    Nemoto, Y.6
  • 8
    • 85027943921 scopus 로고    scopus 로고
    • Christian Esteve Rothenberg and Eemil Lagerspetz, theory and practice of bloom filters for distributed systems
    • Sasu Tarkoma Christian Esteve Rothenberg and Eemil Lagerspetz, theory and practice of bloom filters for distributed systems IEEE Commun. Surv. Tutorials 14 1 2012 131 155
    • (2012) IEEE Commun. Surv. Tutorials , vol.14 , Issue.1 , pp. 131-155
    • Tarkoma, S.1
  • 10
  • 11
    • 84878546532 scopus 로고    scopus 로고
    • LOT: A defense against IP spoofing and flooding attacks
    • Yossi Gilad, and Amir Herzberg LOT: a defense against IP spoofing and flooding attacks ACM Trans. Inf. Syst. Secur. (TISSEC) 15 2 2012 6
    • (2012) ACM Trans. Inf. Syst. Secur. (TISSEC) , vol.15 , Issue.2 , pp. 6
    • Gilad, Y.1    Herzberg, A.2
  • 15
    • 70849102460 scopus 로고    scopus 로고
    • On the statistical characterization of flows in Internet traffic with application to sampling
    • Yousra Chabchoub, Christine Fricker, Fabrice Guillemin, and Philippe Robert On the statistical characterization of flows in Internet traffic with application to sampling Comput. Commun. 33 1 2010 103 112
    • (2010) Comput. Commun. , vol.33 , Issue.1 , pp. 103-112
    • Chabchoub, Y.1    Fricker, C.2    Guillemin, F.3    Robert, P.4
  • 17
    • 84879965798 scopus 로고    scopus 로고
    • A token based method for congestion and packet loss control
    • Z. Shi, D. Ionescu, and D. Zhang A token based method for congestion and packet loss control IEEE Lat. Am. Trans. 11 2 2013 802 811
    • (2013) IEEE Lat. Am. Trans. , vol.11 , Issue.2 , pp. 802-811
    • Shi, Z.1    Ionescu, D.2    Zhang, D.3
  • 20
    • 0038059205 scopus 로고    scopus 로고
    • IP traceback with deterministic packet marking
    • Andrey Belenky, and Nirwan Ansari IP traceback with deterministic packet marking IEEE Commun. Lett. 7 2003 162 164
    • (2003) IEEE Commun. Lett. , vol.7 , pp. 162-164
    • Belenky, A.1    Ansari, N.2
  • 21
    • 33947503628 scopus 로고    scopus 로고
    • Defense against spoofed IP traffic using hop-count filtering
    • Haining Wang, Jin Cheng, and Kang G. Shin Defense against spoofed IP traffic using hop-count filtering IEEE/ACM Trans. Networking (TON) 15 1 2007 40 53
    • (2007) IEEE/ACM Trans. Networking (TON) , vol.15 , Issue.1 , pp. 40-53
    • Wang, H.1    Cheng, J.2    Shin, K.G.3
  • 22
    • 70450232823 scopus 로고    scopus 로고
    • Network applications of bloom filters: A survey
    • Andrei Broder, and Michael Mitzenmacher Network applications of bloom filters: a survey Internet Math. 1 4 2004 485 509
    • (2004) Internet Math. , vol.1 , Issue.4 , pp. 485-509
    • Broder, A.1    Mitzenmacher, M.2
  • 23
    • 0036803648 scopus 로고    scopus 로고
    • Understanding Internet traffic streams: Dragonflies and tortoises
    • N. Brownlee, and K. Claffy Understanding Internet traffic streams: dragonflies and tortoises IEEE Commun. Mag. 40 10 2002 110 117
    • (2002) IEEE Commun. Mag. , vol.40 , Issue.10 , pp. 110-117
    • Brownlee, N.1    Claffy, K.2
  • 25
    • 34247634501 scopus 로고    scopus 로고
    • On deterministic packet marking
    • Belenky Andrey, and Nirwan Ansari On deterministic packet marking Comput. Networks 51 2007 2677 2700
    • (2007) Comput. Networks , vol.51 , pp. 2677-2700
    • Andrey, B.1    Ansari, N.2
  • 27
    • 84900668265 scopus 로고    scopus 로고
    • Binomial Distribution
    • Binomial Distribution. Available from: .


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.