By Topic

Design and implementation of a real-time decentralized source identification system for untrusted IP packets

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

14 Author(s)
Chang, H.Y. ; Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC, USA ; Chen, P. ; Hayatnagarrear, A. ; Narayan, R.
more authors

DECIDUOUS is a security management framework for identifying the “true” sources of network-based intrusions. As in IPv4, normally the source IP address field of an IP packet is untrusted. Therefore, DECIDUOUS utilizes the IPSec security associations as “trapdoors” to derive possible network paths that an attack packet has traveled to reach the target victim. In (Chang et al., 1999), we illustrated the architecture and design of the DECIDUOUS framework. In this paper, we describe our prototype implementation and experimental results

Published in:

DARPA Information Survivability Conference and Exposition, 2000. DISCEX '00. Proceedings  (Volume:2 )

Date of Conference: