Internet Deployment of DPM-based IP Traceback

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Internet Deployment of DPM-based IP Traceback

1 In this article, we introduce the Internet deployment guidelines for Deterministic Packet Marking (DPM) – a novel IP traceback method. Unlike other packet marking schemes, DPM cannot be deployed sporadically on the Internet. Therefore, in order to perform the traceback, a structured way of deployment is needed. Related to topology and deployment issues, discussion comparing the features of ot...

متن کامل

An IP Traceback Scheme Integrating DPM and PPM

IP traceback technology is an important means combating Denial of Service (DoS) attacks in Internet. This paper proposes a new IP traceback scheme constituting two parts: the first part is constructing a traceback tree by integrating Deterministic Packet Marking and Probabilistic Packet Marking, and the second part is getting attack routes by analyzing this traceback tree. Basing on performance...

متن کامل

Performance Analysis of ACO-based IP Traceback

The Internet has experienced a tremendous expansion in its size and complexity since its commercialization. Internet hosts are threatened by large-scale Distributed Denial-ofService (DDoS) attacks in the network. DDoS attacks typically rely on compromising a large number of hosts to generate traffic to a single destination node. Thus the severity of DDoS attacks will likely increase to the poss...

متن کامل

Implementing IP Traceback in the Internet — An ISP Perspective

ISBN 0-7803-9850-5 /$10.00  2002 IEEE Page 326 Abstract--Denial-of-Service (DoS) attacks consume the resources of remote hosts and the network in terms of buffers, processing power, and connections, thus denying or degrading the Internet services to legitimate users. Managed security service (MSS) has been developed to provide better network performance in addition to protect customers from be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computing and Information Technology

سال: 2008

ISSN: 1330-1136,1846-3908

DOI: 10.2498/cit.1001131