A Layer-2 Extension to Hash-Based IP Traceback

  title={A Layer-2 Extension to Hash-Based IP Traceback},
  author={Hiroaki Hazeyama and OE Masafumi and Youki Kadobayashi},
Hash-based IP traceback is a technique to generate audit trails for traffic within a network. Using the audit trails, it reconstructs not only the true attack paths of a Distributed Denial of Service attack (DDoS attack), but also the true path of a single packet attack. However, hash-based IP traceback cannot identify attacker nodes themselves because it has no audit trail on the subnet’s layer-2 network under the detected leaf router, which is the nearest node to an attacker node on a layer-3… CONTINUE READING
11 Extracted Citations
8 Extracted References
Similar Papers

Citing Papers

Publications influenced by this paper.
Showing 1-10 of 11 extracted citations

Referenced Papers

Publications referenced by this paper.
Showing 1-8 of 8 references


  • B. Caswell, M. Roesch
  • http://www.snort.org/. Hiroaki Hazeyama received…
  • 2003
1 Excerpt

Security fun with OCxmon and cflowd

  • G. Sager
  • http:// www.caida.org/projects/ngi/content…
  • 1998
2 Excerpts

Similar Papers

Loading similar papers…