Unmasking of source identity, a step beyond in cyber forensic

RY Patil, SR Devane - Proceedings of the 10th international conference …, 2017 - dl.acm.org
Increasing number of digital crime raises the need of investigation where the most critical
step is to collect the evidences of attack and find the real origin of the attack. However the …

Traceback model for identifying sources of distributed attacks in real time

AA Ahmed, AS Sadiq, MF Zolkipli - Security and …, 2016 - Wiley Online Library
Locating sources of distributed attack is time‐consuming; attackers are identified long after
the attack is completed. This paper proposes a trackback model for identifying attackers and …

[HTML][HTML] IP traceback through modified probabilistic packet marking algorithm using Chinese remainder theorem

Y Bhavani, V Janaki, R Sridevi - Ain Shams Engineering Journal, 2015 - Elsevier
Abstract Probabilistic Packet Marking algorithm suggests a methodology to identify all the
participated routers of the attack path by probabilistically marking the packets. In this …

Hybrid multilayer network traceback to the real sources of attack devices

MH Yang, JN Luo, M Vijayalakshmi, SM Shalinie - Ieee Access, 2020 - ieeexplore.ieee.org
With the advent of the Internet of Things (IoT), there are also major information security risks
hidden behind them. There are major information security risks hidden behind them …

[HTML][HTML] Survey on packet marking algorithms for IP traceback

Y Bhavani, V Janaki, R Sridevi - Oriental Journal of …, 2017 - computerscijournal.org
Distributed Denial of Service (DDoS) attack is an unavoidable attack. Among various attacks
on the network, DDoS attacks are difficult to detect because of IP spoofing. The IP traceback …

Modified probabilistic packet marking algorithm for IPv6 traceback using Chinese remainder theorem

Y Bhavani, V Janaki, R Sridevi - … : Proceedings of the Fourth ICICSE 2016, 2017 - Springer
Abstract Denial of Service (DoS) attack is creating a major problem to the internet security.
Probabilistic Packet Marking (PPM) algorithm suggested a methodology to overcome the …

[PDF][PDF] A Unified Ant Agent Framework for Solving DoS and QoS Problems.

HH Chen, CH Lee, SK Huang - J. Inf. Sci. Eng., 2016 - academia.edu
Anomalous traffic volume can be used for identifying network threats and faults. Denial of
service (DoS) and quality of service (QoS) are two contrasting problems of anomalous …

IP traceback using flow based classification

Y Bhavani, V Janaki, R Sridevi - Recent Advances in Computer …, 2020 - ingentaconnect.com
Background: Distributed Denial of Service (DDoS) attack is a major threat over the internet.
The IP traceback mechanism defends against DDoS attacks by tracing the path traversed by …

[PDF][PDF] Detection of IP Spoofer Source attack through IP Traceback and Packet Marking

MAV Potnurwar - academia.edu
IP Spoofing is the concern of security in which IP addresses get compromised and attacker
will use it to perform DOS attack. Thus, filtering of packets and providing security so that only …

A Multi-Agent Intelligence Hybrid System Technique for Detection and Defense of DDoS Attacks

HH Chen, SK Huang - Intelligent Systems and Applications, 2015 - ebooks.iospress.nl
In the paper, we propose the distributed detection and identification multi-agent system
(DDIMAS) framework that is the first attempt to apply in solving distributed denial of service …