language-icon Old Web
English
Sign In

IP traceback methodologies

2011 
Denial of Service (DoS) is a significant security threat in the internet. The availability of different forms of DoS makes devising solutions hard. The attackers could hide their identity behind legitimate users or spoof the source address of the packets. Therefore, differentiating between legitimate packets and attacker packets becomes difficult. The traceback of the origin of the attack plays a major role in DoS mitigation. In this paper, different traceback methodologies are introduced. In addition, our key observations about one of the techniques, which could help in an enhancement, are presented.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    32
    References
    4
    Citations
    NaN
    KQI
    []