A collaborative peer-to-peer architecture to defend against DDoS attacks

R Saad, F Nait-Abdesselam… - 2008 33rd IEEE …, 2008 - ieeexplore.ieee.org
Nowadays, we are witnessing an important increase in attacks among which distributed
denial-of-service (DDoS) that easily flood the victims using multiple paths. Intrusion …

[PDF][PDF] 网络攻击源追踪技术研究综述

姜建国, 王继志, 孔斌, 胡波, 刘吉强 - … of Cyber Security 信息安全学报, 2018 - jcs.iie.ac.cn
摘要在网络空间中, 网络攻击源追踪是指当检测到网络攻击事件发生后, 能够追踪定位真正的
攻击者的主机, 以帮助司法人员对攻击者采取法律手段. 近二十年, 研究人员对网络攻击源追踪 …

[PDF][PDF] Outfitting an Inter-AS Topology to a Network Emulation TestBed for Realistic Performance Tests of DDoS Countermeasures.

H Hazeyama, M Suzuki, S Miwa, D Miyamoto… - CSET, 2008 - usenix.org
One of the significant requirements for testing a software implementation of an inter-AS
DDoS countermeasure is to measure the performance of the implementation in a large scale …

Taxonomical approach to the deployment of traceback mechanisms

T Takahashi, H Hazeyama, D Miyamoto… - … Baltic Congress on …, 2011 - ieeexplore.ieee.org
The development of cyber society has fostered the emergence of e-commerce, which is
active with business and private transactions. Nevertheless, it also emboldened malicious …

[PDF][PDF] Message Forwarding Strategies for Inter-AS Packet Traceback Network

H Hazeyama, Y Matsumoto… - Proceedings of The 2nd …, 2007 - researchgate.net
Inter-domain traceback techniques and architecture has been long wanted to locate the
ingress point of a DDoS attack on the intradomain backbone network, to discover the source …

The relevance of brands for electronic commerce results from an empirical study of consumers in Europe

RE Strauss, D Schoder… - Proceedings of the 34th …, 2001 - ieeexplore.ieee.org
As the use of the Internet continues to grow among consumers, firms need to assess the
requirements of individual branding-strategies in the context of electronic commerce …

Una arquitectura distribuida para la detección, comunicación y mitigación de la denegación de servicio

L Campo Giralte - 2014 - burjcdigital.urjc.es
Como bien se sabe, en la actualidad los ciberataques tienen lugar en cualquier lugar del
mundo y afectan a todo tipo de infraestructuras. Todos los meses se reciben noticias de …

Design of an fdb based intra-domain packet traceback system

H Hazeyama, Y Matsumoto… - 2008 Third International …, 2008 - ieeexplore.ieee.org
In this paper, we propose an FDB based intra-domain traceback system (FDB-DTS), which is
a hybrid traceback system composed of packet digesting boxes and an iterative query …

IP Traceback method by OpenFlow

N Yoshiura, H Yano - Proceedings of the 3rd International Conference …, 2020 - dl.acm.org
IP traceroute is used to find the routes of egress packets, while IP traceback is used to find
the routes of ingress packets. DDoS attacks spoof source IP address and IP traceback is …

[PDF][PDF] PACKTER: implementation of internet traffic visualizer and extension for network forensics.

D Miyamoto, T Iimura - Computing, 2014 - packter.jp
This paper introduces PACKTER, a free and open source software for visualization of
Internet traffic. This paper also extends it for support network forensics. Many traffic …