Overview of Traceback Mechanisms and Their Applicability

Heung-Youl YOUM
2011 IEICE transactions on information and systems  
As an increasing number of businesses and services depend on the Internet, protecting them against DDoS (Distributed Denial of Service) attacks becomes a critical issue. A traceback is used to discover technical information concerning the ingress points, paths, partial paths or sources of a packet or packets causing a problematic network event. The traceback mechanism is a useful tool to identify the attack source of the (DDoS) attack, which ultimately leads to preventing against the DDoS
more » ... inst the DDoS attack. There are numerous traceback mechanisms that have been proposed by many researchers. In this paper, we analyze the existing traceback mechanisms, describe the common security capabilities of traceback mechanisms, and evaluate them in terms of the various criteria. In addition, we identify typical application of traceback mechanisms. key words: traceback, packet logging, packet marking, overlay network, hybrid traceback, denial of service
doi:10.1587/transinf.e94.d.2077 fatcat:xae4zpuyzfgixipx5ttc2avlqq