A Low‐Overhead and High‐Precision Attack Traceback Scheme with Combination Bloom Filters

J Ma, W Su, Y Li, F Yao - Security and Communication …, 2022 - Wiley Online Library
Distributed denial of service attacks seriously threatens the availability of highly resilient
software‐defined networking systems, such as data center networks. A traceback scheme is …

Improved single packet traceback scheme with Bloom filters

JN Luo, MH Yang - IoT as a Service: Third International Conference …, 2018 - Springer
In response to the rapid development of the Internet in recent years, numerous new Internet
services have been developed to satisfy user needs. However, numerous security issues …

Increasing the effectiveness of packet marking schemes using wrap‐around counting Bloom filter

S Saurabh, AS Sairam - Security and Communication …, 2016 - Wiley Online Library
Latest variants of denial‐of‐service attack like low‐rate denial‐of‐service attack require very
few packets for launching an attack. As a result, reducing the number of packets required for …

TOPO: A topology-aware single packet attack traceback scheme

L Zhang, Y Guan - 2006 Securecomm and Workshops, 2006 - ieeexplore.ieee.org
With the phenomenal growth of the Internet, more and more people enjoy and depend on its
provided services. Unfortunately, the number of network-based attacks is also increasing …

Flexible deterministic packet marking: An IP traceback system to find the real source of attacks

Y Xiang, W Zhou, M Guo - IEEE Transactions on Parallel and …, 2008 - ieeexplore.ieee.org
IP traceback is the enabling technology to control Internet crime. In this paper we present a
novel and practical IP traceback system called Flexible Deterministic Packet Marking …

[PDF][PDF] A new IP traceback system against distributed denial-of-service attacks

RP Laufer, PB Velloso, DO Cunha, IM Moraes… - Proc. 12th ICT, 2005 - gta.ufrj.br
On most denial-of-service (DoS) attacks, packets with spoofed source addresses are
employed in order to disguise the true origin of the attacker. A defense strategy is to trace …

An adaptive probabilistic marking scheme for fast and secure traceback

H Tian, J Bi, X Jiang - Networking Science, 2013 - Springer
IP traceback can be used to find direct generator (s) and path (s) of attacking traffic.
Probabilistic marking schemes, as one type of IP traceback technologies, have been most …

A hybrid scheme using packet marking and logging for IP traceback

S Malliga, A Tamilarasi - International Journal of Internet …, 2010 - inderscienceonline.com
IP traceback is a mechanism for tracing IP packets back to their sources. Tracing
mechanisms include packet marking and logging. Log based traceback has the ability to …

Towards an adaptive packet marking scheme for IP traceback

P Yan, MC Lee - e-Business and Telecommunication Networks, 2006 - Springer
Denial of Service attacks have become one of the most serious threats to the Internet
community. An effective means to defend against such attacks is to locate the attack source …

IP traceback marking scheme based packets filtering mechanism

SY Ping, L Moonchuen - 2004 IEEE International Workshop on …, 2004 - ieeexplore.ieee.org
Denial of service attacks have become one of the most serious threats to the Internet
community. One effective means to defend against such attacks is to locate the attack source …