2008 First International Conference on Emerging Trends in Engineering and Technology 2008
DOI: 10.1109/icetet.2008.155
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Defense Against Distributed Denial of Service in GRID

Abstract: IP spoofing has been exploited by Distributed Denial of Service (DDoS) attacks to conceal flooding sources and localities in flooding traffic, and prevent legitimate hosts into becoming reflectors, redirecting and amplifying flooding traffic. Thus, the ability to filter spoofed IP packets near victims is essential to their own protection as well as to their avoidance of becoming involuntary DoS reflectors. Although an attacker can forge any field in the IP header, he or she cannot falsify the number of hops an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 6 publications
0
0
0
Order By: Relevance
“…For example filtering each packet some traffic pattern and IP history and reject suspected packets. [12][13][14] [15]. Trust based model to mitigate active attacks is suggested by N. Bhalaji, Dr. A. Shanmugam [25].…”
Section: Quality Of Service Issuesmentioning
confidence: 99%
“…For example filtering each packet some traffic pattern and IP history and reject suspected packets. [12][13][14] [15]. Trust based model to mitigate active attacks is suggested by N. Bhalaji, Dr. A. Shanmugam [25].…”
Section: Quality Of Service Issuesmentioning
confidence: 99%