2005
DOI: 10.1016/j.cose.2005.03.005
|View full text |Cite
|
Sign up to set email alerts
|

Defending against spoofed DDoS attacks with path fingerprint

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2006
2006
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…So the victim can execute proper operations (accept or discard) to received packets on a per packet basis. But there is only a 16-bit ID field in the IP header that can be used to carry the information, which is first proposed by Savage et al [5] and then widely accepted by other researchers [6] [7] [8] [10] [11]. This means schemes that make use of the IP ID field can only distinguish no more than 65,536 different paths.…”
Section: A the Basic Idea Of Hpimentioning
confidence: 98%
See 2 more Smart Citations
“…So the victim can execute proper operations (accept or discard) to received packets on a per packet basis. But there is only a 16-bit ID field in the IP header that can be used to carry the information, which is first proposed by Savage et al [5] and then widely accepted by other researchers [6] [7] [8] [10] [11]. This means schemes that make use of the IP ID field can only distinguish no more than 65,536 different paths.…”
Section: A the Basic Idea Of Hpimentioning
confidence: 98%
“…With DBM, similar to Pi, all the packets originating from the same location upon arriving at a destination have a common path signature. Lee et al [11] proposed the ANTID scheme. It use a distance filed to enhance differentiation effects for different paths.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The Dynamic Path Identification mechanism, proposed by Lee et al [8], suggests a router decide the marking bit size dynamically in accordance with the Time-toLive (TTL). Lee et al [9] proposed the ANTID scheme. It uses a distance filed to enhance differentiation effects for different paths.…”
Section: Related Workmentioning
confidence: 99%
“…A correct node identification is critical, and the lack of control on it could yield to vulnerabilities in the replication process, ID spoofing, and DoS attacks (or DDOS, against which a solution such as that proposed in [6] can be applied). An example is the problem of churn, which involves a large number of potentially malicious peers in the P2P system to certify the peers identities.…”
Section: Identification Vs Anonymitymentioning
confidence: 99%