By Topic

IP traceback methodologies

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Alenezi, M. ; Sch. of Comput. Sci. & Electron. Eng., Univ. of Essex, Colchester, UK ; Reed, M.J.

Denial of Service (DoS) is a significant security threat in the internet. The availability of different forms of DoS makes devising solutions hard. The attackers could hide their identity behind legitimate users or spoof the source address of the packets. Therefore, differentiating between legitimate packets and attacker packets becomes difficult. The traceback of the origin of the attack plays a major role in DoS mitigation. In this paper, different traceback methodologies are introduced. In addition, our key observations about one of the techniques, which could help in an enhancement, are presented.

Published in:

Computer Science and Electronic Engineering Conference (CEEC), 2011 3rd

Date of Conference:

13-14 July 2011