메뉴 건너뛰기




Volumn , Issue , 2013, Pages 729-734

A dynamical deterministic packet marking scheme for DDoS traceback

Author keywords

DDoS; Deterministic packet marking; traceback

Indexed keywords

DENIAL-OF-SERVICE ATTACK; NETWORK SECURITY;

EID: 84904090216     PISSN: 23340983     EISSN: 25766813     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2013.6831159     Document Type: Conference Paper
Times cited : (11)

References (15)
  • 1
    • 67649889403 scopus 로고    scopus 로고
    • Flexible deterministic packet marking: An ip traceback system to find the real source of attacks
    • Y. Xiang, W. Zhou, and M. Guo, "Flexible deterministic packet marking: An ip traceback system to find the real source of attacks," IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 4, pp. 567-580, 2009.
    • (2009) IEEE Trans. Parallel Distrib. Syst. , vol.20 , Issue.4 , pp. 567-580
    • Xiang, Y.1    Zhou, W.2    Guo, M.3
  • 3
    • 40749152296 scopus 로고    scopus 로고
    • Probabilistic packet marking for large-scale ip traceback
    • M. T. Goodrich, "Probabilistic packet marking for large-scale ip traceback," IEEE/ACM Trans. Netw., vol. 16, no. 1, pp. 15-24, 2008.
    • (2008) IEEE/ACM Trans. Netw. , vol.16 , Issue.1 , pp. 15-24
    • Goodrich, M.T.1
  • 4
    • 0038059205 scopus 로고    scopus 로고
    • Ip traceback with deterministic packet marking
    • A. Belenky and N. Ansari, "Ip traceback with deterministic packet marking," IEEE Communications Letters, vol. 7, no. 4, pp. 162-164, 2003.
    • (2003) IEEE Communications Letters , vol.7 , Issue.4 , pp. 162-164
    • Belenky, A.1    Ansari, N.2
  • 5
    • 34247634501 scopus 로고    scopus 로고
    • On deterministic packet marking
    • -, "On deterministic packet marking," Computer Networks, vol. 51, no. 10, pp. 2677-2700, 2007.
    • (2007) Computer Networks , vol.51 , Issue.10 , pp. 2677-2700
    • Belenky, A.1    Ansari, N.2
  • 6
    • 36249008514 scopus 로고    scopus 로고
    • A survey of bots used for distributed denial of service attacks
    • V. L. L. Thing, M. Sloman, and N. Dulay, "A survey of bots used for distributed denial of service attacks," in SEC, 2007, pp. 229-240.
    • (2007) SEC , pp. 229-240
    • Thing, V.L.L.1    Sloman, M.2    Dulay, N.3
  • 7
    • 84861634583 scopus 로고    scopus 로고
    • Can we beat legitimate cyber behavior mimicking attacks from botnets?
    • S. Yu, S. Guo, and I. Stojmenovic, "Can we beat legitimate cyber behavior mimicking attacks from botnets" in Proceedings of the INFOCOM, 2012.
    • (2012) Proceedings of the INFOCOM
    • Yu, S.1    Guo, S.2    Stojmenovic, I.3
  • 11
    • 33644906610 scopus 로고    scopus 로고
    • Deterministic packet marking based on redundant decomposition for ip traceback
    • G. Jin and J. Yang, "Deterministic packet marking based on redundant decomposition for ip traceback," IEEE Communications Letters, vol. 10, no. 3, pp. 204-206, 2006.
    • (2006) IEEE Communications Letters , vol.10 , Issue.3 , pp. 204-206
    • Jin, G.1    Yang, J.2
  • 13
    • 69749100394 scopus 로고    scopus 로고
    • An information-theoretic view of network-aware malware attacks
    • Z. Chen and C. Ji, "An information-theoretic view of network-aware malware attacks," IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 530-541, 2009.
    • (2009) IEEE Transactions on Information Forensics and Security , vol.4 , Issue.3 , pp. 530-541
    • Chen, Z.1    Ji, C.2
  • 14
    • 0035823152 scopus 로고    scopus 로고
    • Zipf distribution of U. S. Firm sizes
    • R. L. Axtell, "Zipf distribution of u. s. firm sizes," Science, vol. 293, 2001.
    • (2001) Science , vol.293
    • Axtell, R.L.1
  • 15
    • 79960601554 scopus 로고    scopus 로고
    • A brief history of generative models for power law and lognornal distributions
    • M. Mitzenmacher, "A brief history of generative models for power law and lognornal distributions," Internet Mathematics, vol. 1, 2004.
    • (2004) Internet Mathematics , vol.1
    • Mitzenmacher, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.