2016
DOI: 10.1093/comjnl/bxw011
|View full text |Cite
|
Sign up to set email alerts
|

A Low-Storage Precise IP Traceback Technique Based on Packet Marking and Logging

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…The network supervision department are concerned about its own storage overhead, but not about the storage overheads of traceback service providers. According to [18], by pairwise comparison of B2,i (1≤i≤3), the weight vector of single hierarchical arrangement, that B2,i (1≤i≤3) is relative to B2, is (2,2) = [0.0909 0.0909 0.8182] T (3) According to [18] and Fig. 2, the weight vectors of single hierarchical arrangement, that the 3 rd level is relative to B1 of the 2 nd level, is According to [18] and Fig.…”
Section: Evaluation On 4 Traceback Methodsmentioning
confidence: 99%
“…The network supervision department are concerned about its own storage overhead, but not about the storage overheads of traceback service providers. According to [18], by pairwise comparison of B2,i (1≤i≤3), the weight vector of single hierarchical arrangement, that B2,i (1≤i≤3) is relative to B2, is (2,2) = [0.0909 0.0909 0.8182] T (3) According to [18] and Fig. 2, the weight vectors of single hierarchical arrangement, that the 3 rd level is relative to B1 of the 2 nd level, is According to [18] and Fig.…”
Section: Evaluation On 4 Traceback Methodsmentioning
confidence: 99%
“…At the same time, the MOD server deposits the IP address of the request router and the assigned marks, which are used to identify the IP addresses of the attack sources, respectively, into its MOD database. Fadel et al [42] have presented a new hybrid IP traceback framework. is framework is based on both marking and logging techniques.…”
Section: Ics Intrusion Detection Khalili and Samimentioning
confidence: 99%
“…At the same time, the MOD server deposits the IP address of the request router and the assigned marks, which are used to identify the IP addresses of the attack sources respectivelyinto its MOD database. Fadel et al [14] have presented a new hybrid IP traceback framework. This framework is based on both marking and logging techniques.…”
Section: Ip Tracebackmentioning
confidence: 99%