A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Non-intrusive IP traceback for DDoS attacks
2007
Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiting network routers. ...
Precise information regarding the attack is not required allowing a wide variety of DDoS attack detection techniques to be used. ...
Based on this rationale, we propose a Non-Intrusive IP traceback scheme. ...
doi:10.1145/1229285.1229331
dblp:conf/ccs/ThingSD07
fatcat:tu6tecg2nrbmforqdirfwujdsi
Distributed Denial of Service (DDoS) Attacks and Defence Mechanism
2021
International journal of computer science and mobile computing
The goal of the paper is to set a certain order of existence methods of attack and defense mechanisms, for the better understanding DDoS attacks can be achieved with more effective methods and means of ...
This paper outlines the problem of DDoS attacks and developing a classification of DDoS attacks and DDoS defense mechanisms. ...
and include the traceback data in IP packets. ...
doi:10.47760/ijcsmc.2021.v10i03.010
fatcat:hi3mznjyqbfi3bgr2c4jxytz2m
Adaptive response system for distributed denial-of-service attacks
2009
2009 IFIP/IEEE International Symposium on Integrated Network Management
Experiments on DARE show that the attack detection and mitigation were successfully completed within seconds, with about 60% to 86% of the attack traffic being dropped, while availability for legitimate ...
attacks. ...
The Non Intrusive IP Traceback, and the Enhanced TCP SYN Attack Detector and Bloom-based Filter have also been submitted to the Tan Kah Kee Young Inventors Award Competition (under review). ...
doi:10.1109/inm.2009.5188887
dblp:conf/im/ThingSD09
fatcat:snsnw7mrangqrhlvbniorqorkq
Locating network domain entry and exit point/path for DDoS attack traffic
2009
IEEE Transactions on Network and Service Management
Compared to existing techniques, our approach is non-intrusive, not requiring any changes to the Internet routers and data packets. ...
Precise information regarding the attack is not required allowing a wide variety of DDoS attack detection techniques to be used. The victim is also relieved from the traceback task during an attack. ...
We would also like to thank Emulab for providing the facility for the experiments. ...
doi:10.1109/tnsm.2009.03.090303
fatcat:ln7alfcjrrgklbqszhf6r5f2mi
Network domain entrypoint/path determination for DDoS attacks
2008
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium
Our approach is non-intrusive, not requiring any changes to the Internet routers and data packets. ...
Precise information regarding the attack is not required allowing a wide variety of DDoS attack detection techniques to be used. The victim is also relieved from the traceback task during an attack. ...
In contrast, our approach provides a means for performing traceback in a non-intrusive way. Changes to the Internet routers are not required. ...
doi:10.1109/noms.2008.4575117
dblp:conf/noms/ThingSD08
fatcat:uvfejdmcb5dqpo33dygxajtsha
Intrusion Detection with CUSUM for TCP-Based DDoS
[chapter]
2005
Lecture Notes in Computer Science
DDoS(Distributed Denial of Service) is the most troublesome attack nowadays, especially for those people whose operational environment relies on network services and/or the Internet. ...
In this paper, we propose an Intrusion Detection System (IDS), named CUSUM Intrusion Detection System (CIDS), which invokes CUSUM as its detection algorithm and logically divides Internet into many autonomous ...
Defending with Autonomous NMU CIDS is originally deployed as the detection component of Intrusion Forecast and Traceback System (IFTS) [15] which integrates intrusion detection and traceback and provides ...
doi:10.1007/11596042_127
fatcat:t7b4byu73rduzenyny6ky6xjsa
DDoS attacks and defense mechanisms: classification and state-of-the-art
2004
Computer Networks
This paper presents a structural approach to the DDoS problem by developing a classification of DDoS attacks and DDoS defense mechanisms. ...
Of particular concern are Distributed Denial of Service (DDoS) attacks, whose impact can be proportionally severe. ...
IP Traceback
Intrusion Response
Misuse Detection
Anomaly Detection
Intrusion Detection
Disabling IP Broadcasts
Applying Security Patches
Route-Based Distributed Packet Filtering Egress Filtering ...
doi:10.1016/j.comnet.2003.10.003
fatcat:j5bmatgznraqxcnclv326qr7my
AN IMPROVED IP TRACEBACK MECHANISM FOR NETWORK SECURITY
2013
International Journal of Research in Engineering and Technology
Source IP spoofing attacks are critical issues to the Internet. These attacks are considered to be sent from bot infected hosts. There has been active research on IP traceback technologies. ...
IP traceback is amongst the main challenges that face the security of today's Internet. ...
proposals for IP traceback mechanism has problems with various drawbacks like need for thousands of packets for performing traceback and the in-ability to handle highly distributed and scaled DDoS attacks ...
doi:10.15623/ijret.2013.0208013
fatcat:icivmcczhnb5tock4q6skpyuau
HDSL: A Hybrid Distributed Single-packet Low-storage IP Traceback Framework. (Dept. E)
2021
MEJ Mansoura Engineering Journal
DDoS attack methods could be classified according to the number of attacking packets into flooding and vulnerability attack [2, 3]. ...
I-INTRODUCTION here is no doubt that many DDoS attacks have been reported daily all over the world, these attacks aim to hinder legitimate users from accessing a corporation services or resources, resulting ...
HDSL Many problems with IP protocol design facilitate the mission of the Distributed Denial of Service (DDoS) attackers. ...
doi:10.21608/bfemu.2021.211300
fatcat:pbf275r5tvhovextpgb2b5hnhm
Mitigate DDoS attacks in NDN by interest traceback
2013
2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
We propose Interest traceback as a counter measure against the studied NDN DDoS attacks, which traces back to the originator of the attacking Interest packets. ...
Evaluation results reveal that the Interest traceback method effectively mitigates the NDN DDoS attacks studied in this paper. ...
[6] presents a Non-Intrusive IP traceback scheme which learns valid source addresses transiting network routers from sampled traffic under non-attack conditions for anomaly detection. ...
doi:10.1109/infcomw.2013.6970722
fatcat:2ohgevh6gnbn3dlqjhgbb5xgxy
A Peer-to-Peer Architecture to collaboratively Propagate and Traceback DDoS Attack information using DST
2010
International Journal of Computer Applications
However, the existing detection techniques for DDoS attacks have their entities work in isolation. ...
Intrusion detection and filtering are necessary mechanisms to combat against these attacks and secure networks. ...
Current DDoS solutions are many, ranging from host-based solutions to network and infrastructure solutions. Our architecture is basically proposed for DoS detection and IP traceback solutions. ...
doi:10.5120/899-1274
fatcat:bcomuoec5zetpfnqzr3ktksq2e
Overview of Traceback Mechanisms and Their Applicability
2011
IEICE transactions on information and systems
The traceback mechanism is a useful tool to identify the attack source of the (DDoS) attack, which ultimately leads to preventing against the DDoS attack. ...
As an increasing number of businesses and services depend on the Internet, protecting them against DDoS (Distributed Denial of Service) attacks becomes a critical issue. ...
One of the challenges for preventing against DDoS attacks is that attackers mostly use spoofed source IP addresses (hereafter referred to as spoofed IP addresses) which make it difficult for network administrators ...
doi:10.1587/transinf.e94.d.2077
fatcat:xae4zpuyzfgixipx5ttc2avlqq
Realtime Network IP Traceback Mechanism Against DDOS Attacks
English
2014
International Journal of Computer & Organization Trends
English
Source IP spoofing attacks are critical issues to the Internet.There has been active research on IP traceback technologies. ...
Migration of DDOS attack is one the biggest challenge on the internet and lan networks. ...
and scaled DDoS attacks. ...
doi:10.14445/22492593/ijcot-v8p309
fatcat:4kb4thoworgq3dgtetle6cuzwm
Analysis of Various IP Traceback Techniques - A Survey
2013
International Journal of Computer Applications
IP Traceback may be a important ability for chararcteristics sources of attacks and Starting protection measures for the Internet. ...
As a result, the source address in an IP packet can be fake allowing for Denial Of Service attacks (DoS) or one-way attacks. ...
[2] discussed a novel traceback method for DDoS attacks, based on entropy variations between normal and DDoS attack traffic, which is different from commonly used packet marking techniques. ...
doi:10.5120/13542-1172
fatcat:u4p7q6ua6fhilc3udmzvnk3agq
A Survey on DDoS Attack and Defense Strategies: From Traditional Schemes to Current Techniques
2013
Interdisciplinary Information Sciences
On the other hand, in reflector attacks, zombies send request packets with spoofed IP (IP of the victim) in source address field to a number of other compromised machines (PCs, routers etc.) and the reply ...
against DDoS attacks. ...
In normal IP communications, IP address spoofing is an easy task for attacker. ...
doi:10.4036/iis.2013.173
fatcat:pgvcutvfajejpmgatezon5ftdq
« Previous
Showing results 1 — 15 out of 300 results