改进的确定性数据包标记算法

A. Parashar, R. Radhakrishnan
{"title":"改进的确定性数据包标记算法","authors":"A. Parashar, R. Radhakrishnan","doi":"10.1109/ICACT.2013.6710539","DOIUrl":null,"url":null,"abstract":"Today, Internet has become the primary source of communication in networks. The attack on its infrastructure poses a great challenge in its expansion. Distributed Denial of Service attacks is major source of attacks over the past decade. The goal of the attacker is to spoof the source of IP address to hide its source. Various IP traceback schemes such as Probabilistic Packet Marking, Deterministic Packet marking, TTL base Packet Marking and Hash base IP traceback schemes are proposed to trace source of the attacker. This paper discusses the Improved deterministic packet marking algorithm that is effective in taking appropriate action for the spoof packets along with identification of attacker.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Improved deterministic packet marking algorithm\",\"authors\":\"A. Parashar, R. Radhakrishnan\",\"doi\":\"10.1109/ICACT.2013.6710539\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today, Internet has become the primary source of communication in networks. The attack on its infrastructure poses a great challenge in its expansion. Distributed Denial of Service attacks is major source of attacks over the past decade. The goal of the attacker is to spoof the source of IP address to hide its source. Various IP traceback schemes such as Probabilistic Packet Marking, Deterministic Packet marking, TTL base Packet Marking and Hash base IP traceback schemes are proposed to trace source of the attacker. This paper discusses the Improved deterministic packet marking algorithm that is effective in taking appropriate action for the spoof packets along with identification of attacker.\",\"PeriodicalId\":302640,\"journal\":{\"name\":\"2013 15th International Conference on Advanced Computing Technologies (ICACT)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 15th International Conference on Advanced Computing Technologies (ICACT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACT.2013.6710539\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACT.2013.6710539","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

摘要

今天,互联网已经成为网络通信的主要来源。对其基础设施的攻击对其扩张构成了巨大挑战。分布式拒绝服务攻击是过去十年的主要攻击来源。攻击者的目标是欺骗IP地址的来源,以隐藏其来源。提出了概率标记、确定性标记、TTL标记和Hash标记等多种IP溯源方案来跟踪攻击者的来源。本文讨论了改进的确定性数据包标记算法,该算法可以有效地对欺骗数据包采取适当的措施并识别攻击者。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Improved deterministic packet marking algorithm
Today, Internet has become the primary source of communication in networks. The attack on its infrastructure poses a great challenge in its expansion. Distributed Denial of Service attacks is major source of attacks over the past decade. The goal of the attacker is to spoof the source of IP address to hide its source. Various IP traceback schemes such as Probabilistic Packet Marking, Deterministic Packet marking, TTL base Packet Marking and Hash base IP traceback schemes are proposed to trace source of the attacker. This paper discusses the Improved deterministic packet marking algorithm that is effective in taking appropriate action for the spoof packets along with identification of attacker.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信