IP traceback

Known as: Retracing an IP 
IP traceback is a name given to any method for reliably determining the origin of a packet on the Internet. Due to the trusting nature of the IP… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1998-2018
020406019982018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2004
Highly Cited
2004
Tracing attack packets to their sources, known as IP traceback, is an important step to counter distributed denial-of-service… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We propose a new approach for IP traceback which is scalable and simple to implement, and introduces no bandwidth and practically… (More)
  • figure 2
  • figure 1
Is this relevant?
Highly Cited
2002
Highly Cited
2002
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. Even in the absence of any… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We present a new approach to IP traceback based on the probabilistic packet marking paradigm. Our approach, which we call… (More)
  • table 1
  • table 3
  • table 2
  • table 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Distributed Denial of Service (DDoS) is one of the most difficult security problems to address. While many existing techniques (e… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back toward their source. This… (More)
  • table I
  • figure 1
  • figure 2
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2001
Highly Cited
2001
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. Even in the absence of any… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We present a new solution to the problem of determining the path a packet traversed over the Internet (called the traceback… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Defending against distributed denial-of-service attacks is one of the hardest security problems on the Internet today. One… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This… (More)
Is this relevant?