CenterTrack: An IP Overlay Network for Tracking DoS Floods

  title={CenterTrack: An IP Overlay Network for Tracking DoS Floods},
  author={Robert Stone},
  booktitle={USENIX Security Symposium},
Finding the source of forged Internet Protocol (IP) datagrams in a large, high-speed network is difficult due to the design of the IP protocol and the lack of sufficient capability in most high-speed, highcapacity router implementations. Typically, not enough of the routers in such a network are capable of performing the packet forwarding diagnostics required for this. As a result, tracking-down the source of a flood-type denial-of-service (DoS) attack is usually difficult or impossible in… CONTINUE READING
Highly Influential
This paper has highly influenced 19 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 475 citations. REVIEW CITATIONS
296 Citations
18 References
Similar Papers


Publications citing this paper.
Showing 1-10 of 296 extracted citations

476 Citations

Citations per Year
Semantic Scholar estimates that this publication has 476 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 18 references

Internet Routing Architectures

  • Bassam Halabi
  • New Rider’s Publishing,
  • 1997
Highly Influential
6 Excerpts

Bellovin . ICMP Traceback Messages

  • M Steven
  • Practical Network Support for IP Traceback . To…
  • 2000

ICMP Traceback Messages

  • Steven M. Bellovin
  • IETF Internet Draft,
  • 2000
1 Excerpt

The Latest in Denial of Service Attacks: “Smurfing.

  • Craig A. Huegen
  • 2000
1 Excerpt

Similar Papers

Loading similar papers…