Overview of Traceback Mechanisms and Their Applicability
نویسنده
چکیده
As an increasing number of businesses and services depend on the Internet, protecting them against DDoS (Distributed Denial of Service) attacks becomes a critical issue. A traceback is used to discover technical information concerning the ingress points, paths, partial paths or sources of a packet or packets causing a problematic network event. The traceback mechanism is a useful tool to identify the attack source of the (DDoS) attack, which ultimately leads to preventing against the DDoS attack. There are numerous traceback mechanisms that have been proposed by many researchers. In this paper, we analyze the existing traceback mechanisms, describe the common security capabilities of traceback mechanisms, and evaluate them in terms of the various criteria. In addition, we identify typical application of traceback mechanisms. key words: traceback, packet logging, packet marking, overlay network, hybrid traceback, denial of service
منابع مشابه
Rabies Infection: An Overview of Lyssavirus-Host Protein Interactions
Viruses are obligatory intracellular parasites that use cell proteins to take the control of the cell functions in order to accomplish their life cycle. Studying the viral-host interactions would increase our knowledge of the viral biology and mechanisms of pathogenesis. Studies on pathogenesis mechanisms of lyssaviruses, which are the causative agents of rabies, have revealed some important ho...
متن کاملAn Efficient IP Traceback mechanism for the NGN based on IPv6 Protocol
Protecting against DOS or DDOS attacks can be regarded as one of the most difficult problems on the Internet today. One solution to thwart these attacks is to trace the source of the attacks. However, it is not easy to trace since the attackers usually use the spoofed IP source addresses to hide his or her network location. The key problem includes how to identify the “real” sources of the atta...
متن کاملA Survey on IP Traceback Mechanisms
Security is used to protect the vital information by allowing those who have the right to access and denying the access to those who don’t have right. IP spoofing is one of the network attacks. The attackers will launch an attack by forging the source address. So they will be able to enhance the attacking without exposing their real location. The attacker’s uses fake source IP address to hide t...
متن کاملNewest Targets for Anticonvulsant Agents: An Overview
Epilepsy is a neurological condition characterized by recurrent seizures influencing about 1% of the worldwide population. Despite much progress in understanding the pathogenesis of epilepsy, the molecular basis of human epilepsy still remains unclear. Common approaches for pharmacotherapy of epilepsy are still directed towards controlling the symptoms and suppression of seizures. Clinical use ...
متن کاملAnalysis of secure routing scheme against vampire attack for Manet
Defence against Vampire attacks is one of the primary concerns on the Internet today. Vampire attacks are difficult to prevent because of the open, interconnected nature of the Internet and its underlying protocols, which can be used in several ways to deny service. Attackers hide their identity by using third parties such as private chat channels on IRC (Internet Relay Chat). They also insert ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEICE Transactions
دوره 94-D شماره
صفحات -
تاریخ انتشار 2011