A dynamical Deterministic Packet Marking scheme for DDoS traceback

@article{Yu2013ADD,
  title={A dynamical Deterministic Packet Marking scheme for DDoS traceback},
  author={Shui Yu and Wanlei Zhou and Song Guo and Minyi Guo},
  journal={2013 IEEE Global Communications Conference (GLOBECOM)},
  year={2013},
  pages={729-734}
}
DDoS attack source traceback is an open and challenging problem. Deterministic packet marking (DPM) is a simple and relatively effective traceback scheme among the available traceback methods. However, the existing DPM schemes inheret a critical drawback of scalability in tracing all possible attack sources, which roots at their static mark encoding and attempt to mark all Internet routers for their traceback purpose. We find that a DDoS attack session usually involves a limited number of… CONTINUE READING

Citations

Publications citing this paper.
Showing 1-7 of 7 extracted citations

Opportunistic Piggyback Marking for IP Traceback

IEEE Transactions on Information Forensics and Security • 2016
View 5 Excerpts
Highly Influenced

Coordination of anti-spoofing mechanisms in partial deployments

Journal of Communications and Networks • 2016
View 2 Excerpts

Distributed Denial of Service Attack and Defense

SpringerBriefs in Computer Science • 2014

Denial of Service Attack and Defense

Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xind Siciliano
2013

References

Publications referenced by this paper.
Showing 1-10 of 15 references

IP traceback with deterministic packet marking

IEEE Communications Letters • 2003
View 4 Excerpts
Highly Influenced

Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient

IEEE Transactions on Parallel and Distributed Systems • 2012
View 1 Excerpt

An Information-Theoretic View of Network-Aware Malware Attacks

IEEE Transactions on Information Forensics and Security • 2009
View 1 Excerpt

Probabilistic Packet Marking for Large-Scale IP Traceback

IEEE/ACM Transactions on Networking • 2008
View 2 Excerpts

On deterministic packet marking

——
Computer Networks, vol. 51, no. 10, pp. 2677–2700, 2007. • 2007
View 3 Excerpts

Similar Papers

Loading similar papers…