[PDF][PDF] A Comparative Study over Various IP Traceback Schemes

DA Luke - International Journal of Engineering Research, 2014 - academia.edu
Defending against distributed denial-of service attacks is one of the hardest security
problems on the Internet today. One difficulty to overcome these type of attacks is to trace the …

A Design of IPTSF (IP Traceback System based on Forensics) against network attacks using both BLH (Black List based on a Hash Function) and TFAP (Traffic Flow …

I Jung, EH Jeong, BK Lee - International Information Institute …, 2013 - search.proquest.com
This paper proposes a design of IPTSF (IP Traceback System based on Forensics) against
network attacks using both BLH (Black List based on a Hash Function) and TFAP (Traffic …

[PDF][PDF] A Design of VCM (Vessel Communication Manager) Improving Communication Efficiency and Security with ARP (Azimuth based Routing Protocol) and NATF …

I Jung, EH Jeong, BK Lee - International Journal of Smart Home, 2013 - gvpress.com
Abstract The VCM (Vessel Communication Manager) proposed in this paper consists of ARP
(Azimuth based Routing Protocol) and NATF (Network Attack Traceback Facility). The ARP …