作者
Krishan Kumar, AL Sangal, Abhinav Bhandari
发表日期
2011/9/15
来源
2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)
页码范围
491-498
出版商
IEEE
简介
Distributed denial-of-service (DDoS) is a rapidly growing problem. In a typical DDOS attacks a large number of compromised hosts (Zombies) are amassed to send useless packets to jam the victim, or its Internet connection or both. The problem of identifying the attack sources is one of the hardest threats in internet security due to the similarity between the legitimate and illegitimate traffic. Firstly, it is important characteristics of the DDOS attacks that they hide their identities/origins (IP Spoofing). Secondly, the stateless nature of the IP routing where routers normally know only the next hop for the forwarding of packets rather than the complete end to end route taken by each packet make IP traceback difficult. IP traceback (the ability to trace IP packets from source to destination) is a significant step toward identifying and, thus, stopping, attackers. This Review paper evaluates and describes the effectiveness of different …
引用总数
2013201420152016201720182019202020212022202320241527324121
学术搜索中的文章
K Kumar, AL Sangal, A Bhandari - 2011 2nd International Conference on Computer and …, 2011