2013 15th International Conference on Advanced Computing Technologies (ICACT) 2013
DOI: 10.1109/icact.2013.6710539
|View full text |Cite
|
Sign up to set email alerts
|

Improved deterministic packet marking algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…IP traceback schemes are classified into packet marking [1–9], packet logging [10, 11], packet messaging [12], and hybrid schemes [13–18]. Packet marking and messaging schemes require a victim or any traceback server to collect a large number of attack packets to reach the attack source.…”
Section: Introductionmentioning
confidence: 99%
“…IP traceback schemes are classified into packet marking [1–9], packet logging [10, 11], packet messaging [12], and hybrid schemes [13–18]. Packet marking and messaging schemes require a victim or any traceback server to collect a large number of attack packets to reach the attack source.…”
Section: Introductionmentioning
confidence: 99%
“…IDPM technique 14 is effective in finding the spoof packets. In this technique the ingress router will deterministically mark the packets with the IP address and the hash value of the IP address.…”
Section: Improved Deterministic Packet Marking Algorithmmentioning
confidence: 99%