2018
DOI: 10.1007/978-981-13-0617-4_43
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Optimization Algorithm Based on Ant Colony and Particle Swarm Algorithm to Address IP Traceback Problem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…The primary objective is to utilize and combine existing methods to leverage their strengths. The core idea of packet marking method [11][12][13][14][15][16] is to record routing information within the packet itself, allowing the victim to trace the packet's transmission path. A packet can carry complete encoded routing information or have one or more markers inserted by intermediate routers.…”
Section: Al Proposed a Flooding Technique Inmentioning
confidence: 99%
“…The primary objective is to utilize and combine existing methods to leverage their strengths. The core idea of packet marking method [11][12][13][14][15][16] is to record routing information within the packet itself, allowing the victim to trace the packet's transmission path. A packet can carry complete encoded routing information or have one or more markers inserted by intermediate routers.…”
Section: Al Proposed a Flooding Technique Inmentioning
confidence: 99%
“…(1) Link testing [18,19] is often used to trace back the attacking path and the attacking source in real time. (2) e packet marking methods [2,3,20] are characterized by inserting the required traceability data into the IP packet to be traced, thus marking the packet as it travels through the forwarding network facilities (switches or routers) to the destination host. e packet marking schemes only use the information embedded in packets without generating additional traffic.…”
Section: Related Workmentioning
confidence: 99%
“…Internet Protocol (IP) traceback is a method of reconstructing the attacking path and identifying the source of the attacker, with the message provided by the network devices where the attacking packets are forwarded. However, the effectiveness of traditional traceback schemes is affected by different problems, such as IP spoofing, packet length limits, and additional communication overhead [2][3][4][5]. Among them, IP spoofing means attackers often forge the source IP address of packets, resulting in low traceability accuracy.…”
Section: Introductionmentioning
confidence: 99%
“…The marking rate in is depends on trustable nodes or not. To trace back an attack using a single packet, research has proposed the packet logging traceback [24] [25] [26] [27] and hybrid IP traceback [28] [38].…”
Section: Introductionmentioning
confidence: 99%