2019 IEEE 5th International Conference on Computer and Communications (ICCC) 2019
DOI: 10.1109/iccc47050.2019.9064353
|View full text |Cite
|
Sign up to set email alerts
|

RPDT: An Architecture for IP Traceback in Partial Deployment Scenario

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…Ling et al proposed a method to alter the TCP flow control messages server-side switches of the Software-Defined Networking (SDN) networks to trace the source [39]. Li et al developed a log-based IP traceback architecture suitable for partial deployment scenario in ISP level [40] Thus, Baba et al [41] used the data link layer to trace back the source of attackers. However, this method traces back only to the edge router closest to the attacker and not to the location of the device that launched the attack.…”
Section: Introductionmentioning
confidence: 99%
“…Ling et al proposed a method to alter the TCP flow control messages server-side switches of the Software-Defined Networking (SDN) networks to trace the source [39]. Li et al developed a log-based IP traceback architecture suitable for partial deployment scenario in ISP level [40] Thus, Baba et al [41] used the data link layer to trace back the source of attackers. However, this method traces back only to the edge router closest to the attacker and not to the location of the device that launched the attack.…”
Section: Introductionmentioning
confidence: 99%