{"title":"基于Bloom过滤器的IP回溯的Netfilter开源框架","authors":"Tabassom Shahsafi, Bahram Bahrambeigy, M. Ahmadi","doi":"10.1109/IKT.2015.7288672","DOIUrl":null,"url":null,"abstract":"Routing only based on destination IP address is one of the major potential threats of current Internet routers that enables attackers to attack victims from forged sources. IP packet Traceback is one of the important defense mechanisms against Denial of Service (DoS) attacks because it traces packets from source to destination. In this paper, an IP Traceback method based on efficient Bloom filter data-structure and Netfilter open-source framework is proposed in which outperforms previous methods in terms of speed, memory usage, memory and processing overhead.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"229 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Bloom filter-based IP Traceback on Netfilter open-source framework\",\"authors\":\"Tabassom Shahsafi, Bahram Bahrambeigy, M. Ahmadi\",\"doi\":\"10.1109/IKT.2015.7288672\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Routing only based on destination IP address is one of the major potential threats of current Internet routers that enables attackers to attack victims from forged sources. IP packet Traceback is one of the important defense mechanisms against Denial of Service (DoS) attacks because it traces packets from source to destination. In this paper, an IP Traceback method based on efficient Bloom filter data-structure and Netfilter open-source framework is proposed in which outperforms previous methods in terms of speed, memory usage, memory and processing overhead.\",\"PeriodicalId\":338953,\"journal\":{\"name\":\"2015 7th Conference on Information and Knowledge Technology (IKT)\",\"volume\":\"229 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-05-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 7th Conference on Information and Knowledge Technology (IKT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IKT.2015.7288672\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 7th Conference on Information and Knowledge Technology (IKT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IKT.2015.7288672","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Bloom filter-based IP Traceback on Netfilter open-source framework
Routing only based on destination IP address is one of the major potential threats of current Internet routers that enables attackers to attack victims from forged sources. IP packet Traceback is one of the important defense mechanisms against Denial of Service (DoS) attacks because it traces packets from source to destination. In this paper, an IP Traceback method based on efficient Bloom filter data-structure and Netfilter open-source framework is proposed in which outperforms previous methods in terms of speed, memory usage, memory and processing overhead.