By Topic

A complex analysis approach to the modelling for the tracing and identification of Denial-of-Service attackers

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Mateus Mosca Viana ; Depto. de Engenharia de Teleinfomática/UFC e Instituto Atlântico, Brazil ; Jose Neuman de Souza

The denial-of-service (DoS) and distributed denial-of-service (DDoS) are two of the most raging attacks against computers networks, specially the Internet. The first action all the countermeasures to this kind of attack use to propose is the data collection from the packets, to acquire lots of clues from attack space. Then use these data to reconstruct the attack paths and determine the origins of the attack. Among these suggested countermeasures there exist those using the probability packet marking (PPM) approach, as a manner of data acquisition. On the other hand, the attack paths reconstruction may be made by means of several distinct methods. This article presents the use of some aspects of the theory of complex analysis in modelling the tracing and identifying computers network denial-of-service attackers.

Published in:

Telecommunications and Malaysia International Conference on Communications, 2007. ICT-MICC 2007. IEEE International Conference on

Date of Conference:

14-17 May 2007