2007
DOI: 10.1016/j.jnca.2005.07.005
|View full text |Cite
|
Sign up to set email alerts
|

Provider-based deterministic packet marking against distributed DoS attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 15 publications
(17 reference statements)
0
2
0
Order By: Relevance
“…Traditional DDoS defense systems that attempt to alleviate DDoS attacks via packet filtering [38] using techniques such as packet marking [6], [7], [8], [9], [10], [11] and push-back techniques [39], [40], [41], [42] filter traffic at ingress and egress points on the network, but are incapable of withstanding DDoS attacks of the size of the Mirai botnet used in our evaluation. In general, no existing system with minimal deployment requirements provides botnet-size independence, the ability to defend against attacks regardless of the size of the malicious botnet sending attack traffic.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Traditional DDoS defense systems that attempt to alleviate DDoS attacks via packet filtering [38] using techniques such as packet marking [6], [7], [8], [9], [10], [11] and push-back techniques [39], [40], [41], [42] filter traffic at ingress and egress points on the network, but are incapable of withstanding DDoS attacks of the size of the Mirai botnet used in our evaluation. In general, no existing system with minimal deployment requirements provides botnet-size independence, the ability to defend against attacks regardless of the size of the malicious botnet sending attack traffic.…”
Section: Related Workmentioning
confidence: 99%
“…These gaps arise from three core challenges. First, filtering and prioritization techniques [6], [7], [8], [9], [10], [11] claim to alleviate congestion by distinguishing between benign and malicious traffic, and then filtering out the malicious traffic. Despite advances in this area, filtering and related methods such as traffic prioritization require costly per-stream calculations, presenting scalability concerns with modern DDoS attacks.…”
Section: Introductionmentioning
confidence: 99%