A two-level source address spoofing prevention based on automatic signature and verification mechanism

@article{Shen2008ATS,
  title={A two-level source address spoofing prevention based on automatic signature and verification mechanism},
  author={Yan Shen and Jun Bi and Jianping Wu and Qiang Liu},
  journal={2008 IEEE Symposium on Computers and Communications},
  year={2008},
  pages={392-397}
}
IP source address spoofing is used by DDoS and DrDoS attacks in the Internet. This paper presents a signature-and-verification based IP spoofing prevention method, automatic peer-to-peer based anti-spoofing method (APPA). APPA has two levels: intra-AS (autonomous system) level and inter-AS level. In the intra-AS level, the end host tags a one-time key into each outgoing packet and the gateway at the AS border verifies the key. In inter-AS level, the gateway at the AS border tags a periodically… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 12 CITATIONS

A Multi-fence Countermeasure Based Inter-domain Source Address Validation Method

  • 2012 IEEE 11th International Symposium on Network Computing and Applications
  • 2012
VIEW 10 EXCERPTS
CITES METHODS, RESULTS & BACKGROUND
HIGHLY INFLUENCED

SafeZone: A Hierarchical Inter-Domain Authenticated Source Address Validation Solution

  • 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011
  • 2011
VIEW 10 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

A blackhole attack analysis for Barrage Relay Networks

  • PROCEEDINGS OF 2013 International Conference on Sensor Network Security Technology and Privacy Communication System
  • 2013

References

Publications referenced by this paper.
SHOWING 1-9 OF 9 REFERENCES

Hop-count filtering: an effective defense against spoofed DDoS traffic

  • ACM Conference on Computer and Communications Security
  • 2003
VIEW 1 EXCERPT

On IP traceback

  • IEEE Communications Magazine
  • 2003
VIEW 1 EXCERPT

The KISS generator", http://oldmill.uchicago.edul--wilder/Code/random/Papers/Ma rsaglia_2003.html

G. Marsaglia
  • 2003
VIEW 1 EXCERPT

" Cryptography with chaos " [ J ]

S. BaptistaM.
  • Physics Letters A
  • 1998

Stream Ciphers", RSA Laboratories

MJ.B Robshaw
  • Technical Report TR-701, July
  • 1995
VIEW 1 EXCERPT

Similar Papers

Loading similar papers…