2014
DOI: 10.1002/sec.1022
|View full text |Cite
|
Sign up to set email alerts
|

Coloring networks for attacker identification and response

Abstract: Network-based attacks such as denial-of-service attacks are usually performed by spoofing the source IP address. Packet marking techniques are used to trace such attackers as close as possible to their source. A packet mark consists of some traceback information pertaining to a router being embedded in the IP packet header. In this work, we use the concept of star coloring to assign reusable colors (marks) to routers but at the same time limits false positives and false negatives. The proposed scheme minimizes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…In [57], the authors reduced the traffic load of high capacity cellular networks, by mapping the problem of caching popular files to a graph which is divided into four new subgraphs serving as the foundation of graph coloring in the presented method. In [58], the authors presented a scheme to trackback DoS attacks based on packet marking. The trackback involves color balanced star coloring to assign color to routers.…”
Section: On-line Coloringmentioning
confidence: 99%
“…In [57], the authors reduced the traffic load of high capacity cellular networks, by mapping the problem of caching popular files to a graph which is divided into four new subgraphs serving as the foundation of graph coloring in the presented method. In [58], the authors presented a scheme to trackback DoS attacks based on packet marking. The trackback involves color balanced star coloring to assign color to routers.…”
Section: On-line Coloringmentioning
confidence: 99%
“…IP traceback brings the attackers under the ambit of law and deters them from launching further attacks. The latest variants of DoS attack like low‐rate DoS (LRDoS) attack and highly distributed DoS attack require very few packets for launching a DoS attack .…”
Section: Introductionmentioning
confidence: 99%