Scheduled System Maintenance on May 29th, 2015:
IEEE Xplore will be upgraded between 11:00 AM and 10:00 PM EDT. During this time there may be intermittent impact on performance. For technical support, please contact us at We apologize for any inconvenience.
By Topic

Keynote III: Detection and traceback of DDoS attacks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Wanlei Zhou ; Fac. of Sci. & Technol., Deakin Univ., Melbourne, VIC

Distributed Denial-of-Service (DDoS) attacks are a huge threat to the Internet. Because it is easy to change the source addresses of IP packets, plus the memory-less feature of the Internet, it is extremely hard to defend against DDoS attacks. In this talk, we discuss two particular challenges in dealing with DDoS attacks: the discrimination of DDoS attacks from fresh cloud traffic and the traceback of attack packets to their origins, and propose a number of methods to deal with these challenges. The talk is divided into the following three parts: 1. An overview of existing techniques in dealing with DDoS attacks. 2. Detection of network behavior mimicking DDoS attacks. 3. Trace IP packets of DDoS attacks.

Published in:

Computer and Information Technology, 2008. CIT 2008. 8th IEEE International Conference on

Date of Conference:

8-11 July 2008