2022
DOI: 10.1155/2022/1639203
|View full text |Cite
|
Sign up to set email alerts
|

A Low-Overhead and High-Precision Attack Traceback Scheme with Combination Bloom Filters

Abstract: Distributed denial of service attacks seriously threatens the availability of highly resilient software-defined networking systems, such as data center networks. A traceback scheme is an effective means of mitigating attacks by identifying the location of the attacker and the attacking path. However, traditional traceback schemes suffer from low traceability success rates, high packet header overheads, and high communication traffic overheads, in addition to the fact that logically centralized traceability sch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…The primary objective is to utilize and combine existing methods to leverage their strengths. The core idea of packet marking method [11][12][13][14][15][16] is to record routing information within the packet itself, allowing the victim to trace the packet's transmission path. A packet can carry complete encoded routing information or have one or more markers inserted by intermediate routers.…”
Section: Al Proposed a Flooding Technique Inmentioning
confidence: 99%
See 1 more Smart Citation
“…The primary objective is to utilize and combine existing methods to leverage their strengths. The core idea of packet marking method [11][12][13][14][15][16] is to record routing information within the packet itself, allowing the victim to trace the packet's transmission path. A packet can carry complete encoded routing information or have one or more markers inserted by intermediate routers.…”
Section: Al Proposed a Flooding Technique Inmentioning
confidence: 99%
“…Efficient probabilistic packet marking for Autonomous System (AS) traceback proposed by Nur A. Y. [11] in recent years, the scheme utilizing a combination of Bloom filters for marking developed by Jie Ma [12] and a probabilistic packet marking scheme with traffic-aware capabilities introduced by Mingxing Liu [13] are all typical PPM-based approaches. In DPM (also known as Node Attachment), traceback data from the entire path is appended to the original IP packet header as it travels along the path.…”
Section: Al Proposed a Flooding Technique Inmentioning
confidence: 99%