2012
DOI: 10.1109/lcomm.2012.051512.120467
|View full text |Cite
|
Sign up to set email alerts
|

An Incrementally Deployable Flow-Based Scheme for IP Traceback

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 2 publications
0
10
0
Order By: Relevance
“…However, so far, most approaches for IP traceback are hard to be deployed in the Internet because of deployment difficulties. An incrementally deployable approach is presented in [86] based on sampled flows for IP traceback (Sample-Trace). In SampleTrace, it is not necessary to deploy any dedicated traceback software and hardware at routers, and an AS-level overlay network is built for incremental deployment.…”
Section: B Ddos Attacks Defense Mechanisms Using Sdnmentioning
confidence: 99%
See 2 more Smart Citations
“…However, so far, most approaches for IP traceback are hard to be deployed in the Internet because of deployment difficulties. An incrementally deployable approach is presented in [86] based on sampled flows for IP traceback (Sample-Trace). In SampleTrace, it is not necessary to deploy any dedicated traceback software and hardware at routers, and an AS-level overlay network is built for incremental deployment.…”
Section: B Ddos Attacks Defense Mechanisms Using Sdnmentioning
confidence: 99%
“…In SampleTrace, it is not necessary to deploy any dedicated traceback software and hardware at routers, and an AS-level overlay network is built for incremental deployment. The authors of [86] theoretically analyze the quantitative relation among the probability that a flow is successfully traced back various ASlevel hop number, independently sampling probability, and the packet number that the attacking flow comprises. Although it needs to build an AS-level overlay network for incremental deployment, it can be extended to SDN networks.…”
Section: B Ddos Attacks Defense Mechanisms Using Sdnmentioning
confidence: 99%
See 1 more Smart Citation
“…Pillutla and Arjunan [122] presents a Fuzzy self organizing maps-based DDoS mitigation (FSOMDM) technique that is ideally and suitably designed in cloud computing. Meanwhile, there are many research works [11], [26], [32], [34], [42], [58], [70], [71], [83], [91]- [93], [103], [106], [108], [111], [112], [121], [122] on moderating DDoS attack utilizing SDN. These techniques may give some assistance in future research on relieving DDos attack in cloud computing.…”
Section: B Mitigating Ddos Attack In Cloud Computingmentioning
confidence: 99%
“…Leveraging the dynamic rule update feature of SDN, Tian et al [28] analyzes the probability that a flow is traced back across multiple Autonomous System (AS) hops by sampling the probability and the signature of the attack traffic. NetSight captures packet histories to investigate events of interest to trace the network state [29].…”
Section: Destination-based Mechanismsmentioning
confidence: 99%