2012
DOI: 10.7763/ijfcc.2012.v1.15
|View full text |Cite
|
Sign up to set email alerts
|

A Probabilistic Packet Marking scheme with LT Code for IP Traceback

Abstract: Abstract-Cybercrime has become an important issue in the cyber-society. Distributed Denial of Service attack is the most popular attack, which uses many zombies to attack the victim, makes victim crashed and interrupt services. We propose the LT Code IP Traceback scheme to reconstruct the attack graph and find the source of attacker. LTCIP overcomes the collision problem in traditional packet marking scheme. It uses fewer packets to reconstruct the attack graph. Finally, our LTCIP is a reliable IP Traceback sc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…During an attack, this unique piece of embedded information increases the feasibility to identify and drop packets traveling through the same path. Peng et al, [6] proposed a probabilistic packet marking scheme for pushback of attack source. The packet marking is based on probability and code transformation.…”
Section: Related Workmentioning
confidence: 99%
“…During an attack, this unique piece of embedded information increases the feasibility to identify and drop packets traveling through the same path. Peng et al, [6] proposed a probabilistic packet marking scheme for pushback of attack source. The packet marking is based on probability and code transformation.…”
Section: Related Workmentioning
confidence: 99%
“…In 2012 by Shih-Hao Peng et. All introduce A Probabilistic Packet Marking scheme and propose the LT Code IP Trace back scheme to reconstruct the attack graph and find the source of attacker and finally LTCIP is a reliable IP Trace back scheme, which can find the source of DDoS and avoid the attack [10].…”
Section: Related Workmentioning
confidence: 99%
“…The probability packet marking approach is proposed in Ref. . Each node marks packet with some probability in this approach, which can reduce the length of packets.…”
Section: Introductionmentioning
confidence: 99%