2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applicati 2015
DOI: 10.1109/idaacs.2015.7340783
|View full text |Cite
|
Sign up to set email alerts
|

A survey of modern IP traceback methodologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…• Attack source identification uses mechanisms to find the source IP address to block them. IP Traceback [4] is the most popular mechanism to identify the attacker source IP address.…”
Section: Ddos Defense Mechanismmentioning
confidence: 99%
“…• Attack source identification uses mechanisms to find the source IP address to block them. IP Traceback [4] is the most popular mechanism to identify the attacker source IP address.…”
Section: Ddos Defense Mechanismmentioning
confidence: 99%
“…Currently, several defense mechanisms have been proposed for the SYN flooding attacks such as Syn cookies [9], Syn cache [10], Synkill [11], Syn proxying [12]. However to locate the flooding sources, the former mechanisms have to rely on the expensive IP traceback such as, hop-by-hop tracing, ICMP-based traceback, and Packet marking [13].…”
Section: Introductionmentioning
confidence: 99%