2008 Third International Conference on Communications and Networking in China 2008
DOI: 10.1109/chinacom.2008.4685008
|View full text |Cite
|
Sign up to set email alerts
|

A Pi2HC mechanism against DDoS attacks

Abstract: Distributed Denial of Service (DDoS) attacks pose a major threat to today's cyber security. Defense against these attacks is complicated by source IP address spoofing. The Path Identification (Pi) mechanism is a promising technique to defend against DDoS attacks with IP spoofing. In the Pi scheme, each router marks forwarding packets to generate particular identifiers corresponding to different paths, which can be used to distinguish between malicious packets and legitimate ones. To improve the previous Pi sch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2009
2009
2009
2009

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…It use a distance filed to enhance differentiation effects for different paths. We proposed a Pi2HC [12] mechanism which utilizes both the Pi and Hop count refelected by TTL.…”
Section: Related Workmentioning
confidence: 99%
“…It use a distance filed to enhance differentiation effects for different paths. We proposed a Pi2HC [12] mechanism which utilizes both the Pi and Hop count refelected by TTL.…”
Section: Related Workmentioning
confidence: 99%