By Topic

IP Traceback Methodology Using Markov Chain and Bloom Filter in 802.16e

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Do Hoon Kim ; Dept. of Comput. Sci. & Eng., Korea Univ., Seoul ; Hoh Peter In ; Byungsik Yoon

Recently, network resource is extremely vulnerable to DDoS attacks which has become a pressing problem due to scarce an efficient method to locate the real attacker. Especially, the more network topology advanced and complex such as 802.16e (WiBro), IP traceback is difficult. According to, in this paper, the IP Traceback methodology using Markov chain based on XOR operation is proposed in 802.16e. Also the paper provides a traceback method including: receiving data including access control router information according to a path of an attacker; filtering the data to hash the data, and storing the resultant hashed information; determining whether the data is normally received on the basis of the hashed information; and predicting a path loss on the basis of the determination result. Therefore, it is possible to perform an accurate IP traceback using a probabilistic packing marking method and a hash-based traceback method.

Published in:

Convergence and Hybrid Information Technology, 2008. ICCIT '08. Third International Conference on  (Volume:2 )

Date of Conference:

11-13 Nov. 2008