Overview of Traceback Mechanisms and Their Applicability

نویسنده

  • Heung-Youl Youm
چکیده

As an increasing number of businesses and services depend on the Internet, protecting them against DDoS (Distributed Denial of Service) attacks becomes a critical issue. A traceback is used to discover technical information concerning the ingress points, paths, partial paths or sources of a packet or packets causing a problematic network event. The traceback mechanism is a useful tool to identify the attack source of the (DDoS) attack, which ultimately leads to preventing against the DDoS attack. There are numerous traceback mechanisms that have been proposed by many researchers. In this paper, we analyze the existing traceback mechanisms, describe the common security capabilities of traceback mechanisms, and evaluate them in terms of the various criteria. In addition, we identify typical application of traceback mechanisms. key words: traceback, packet logging, packet marking, overlay network, hybrid traceback, denial of service

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Rabies Infection: An Overview of Lyssavirus-Host Protein Interactions

Viruses are obligatory intracellular parasites that use cell proteins to take the control of the cell functions in order to accomplish their life cycle. Studying the viral-host interactions would increase our knowledge of the viral biology and mechanisms of pathogenesis. Studies on pathogenesis mechanisms of lyssaviruses, which are the causative agents of rabies, have revealed some important ho...

متن کامل

An Efficient IP Traceback mechanism for the NGN based on IPv6 Protocol

Protecting against DOS or DDOS attacks can be regarded as one of the most difficult problems on the Internet today. One solution to thwart these attacks is to trace the source of the attacks. However, it is not easy to trace since the attackers usually use the spoofed IP source addresses to hide his or her network location. The key problem includes how to identify the “real” sources of the atta...

متن کامل

A Survey on IP Traceback Mechanisms

Security is used to protect the vital information by allowing those who have the right to access and denying the access to those who don’t have right. IP spoofing is one of the network attacks. The attackers will launch an attack by forging the source address. So they will be able to enhance the attacking without exposing their real location. The attacker’s uses fake source IP address to hide t...

متن کامل

Newest Targets for Anticonvulsant Agents: An Overview

Epilepsy is a neurological condition characterized by recurrent seizures influencing about 1% of the worldwide population. Despite much progress in understanding the pathogenesis of epilepsy, the molecular basis of human epilepsy still remains unclear. Common approaches for pharmacotherapy of epilepsy are still directed towards controlling the symptoms and suppression of seizures. Clinical use ...

متن کامل

Analysis of secure routing scheme against vampire attack for Manet

Defence against Vampire attacks is one of the primary concerns on the Internet today. Vampire attacks are difficult to prevent because of the open, interconnected nature of the Internet and its underlying protocols, which can be used in several ways to deny service. Attackers hide their identity by using third parties such as private chat channels on IRC (Internet Relay Chat). They also insert ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEICE Transactions

دوره 94-D  شماره 

صفحات  -

تاریخ انتشار 2011