2016
DOI: 10.1007/978-3-319-45719-2_14
|View full text |Cite
|
Sign up to set email alerts
|

On the Feasibility of TTL-Based Filtering for DRDoS Mitigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 11 publications
0
7
0
Order By: Relevance
“…Nevertheless, clustering methods such as KNN allowed researchers to fingerprint a few major attacking entities and attribute attacks to them [21,28]. Another commonly used feature is the IP Time-To-Live (TTL) field, which was used to narrow down attack origins [7,27].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Nevertheless, clustering methods such as KNN allowed researchers to fingerprint a few major attacking entities and attribute attacks to them [21,28]. Another commonly used feature is the IP Time-To-Live (TTL) field, which was used to narrow down attack origins [7,27].…”
Section: Background and Related Workmentioning
confidence: 99%
“…iTTL: Rounding the TTL value up to the next power of 2 results in the iTTL value [13,46,55]. Using iTTL, we find only 6 prefixes with inconsistent behavior, all caused by 22 IP addresses responding with differing iTTL values to our 2 consecutive probes.…”
Section: Fingerprinting Aliased Prefixesmentioning
confidence: 89%
“…Below, we investigate replies from 20,692 /64 prefixes classified as aliased, for which all of our 16 APD probes to TCP/80 succeeded on May 11, 2018. We first analyze TTL values of response packets. Previous work found that TTL values cannot be expected to be constant per prefix or even IP address [13,67]. TTL inconsistencies can stem from routing changes, TTL-manipulating middleboxes, or other on-path effects.…”
Section: Fingerprinting Aliased Prefixesmentioning
confidence: 99%
“…The ASes can declare illegal paths for pseudo they do not have, pull part of the traffic to these prefixes or all. Backes et al [37] proposed a solution based on the idea that the assailant cannot guess or juggle the number of leaps between the amplifier and victim. Hop-count filtering (HCF) technique is used to analyze the time-to-live (TTL) of entering packets.…”
Section: Drdos Attacks Based On Tcp Protocolmentioning
confidence: 99%