A survey of modern IP traceback methodologies

2015 
Today network security is major problem faced not only by small companies but big giants like Samsung and Google. Traditional architecture of internet is vulnerable to DDoS attacks and it provides an opportunity to an attacker to get access to a great amount of compromised hosts by using their vulnerabilities to create attack networks or Botnets. Although a number of defense techniques and countermeasures against DDoS attacks are developed, the number of such attacks is still increasing. The main reason for that is that scientists and law enforcement agencies are still not able to answer a important question: where is the real source of DDoS attack? In this paper, we tend to survey different types of traceback techniques and methodologies.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    18
    References
    6
    Citations
    NaN
    KQI
    []