2008 International Conference on Computing, Communication and Networking 2008
DOI: 10.1109/icccnet.2008.4787693
|View full text |Cite
|
Sign up to set email alerts
|

Detection and defense against DDoS attack with IP spoofing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…Several studies have used the TTL values in different ways to detect IP spoofing attacks [16,17,26,23,24,12,25]. Beverly et al [26] have presented a forensic carving technique of network packets and associated data structures.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Several studies have used the TTL values in different ways to detect IP spoofing attacks [16,17,26,23,24,12,25]. Beverly et al [26] have presented a forensic carving technique of network packets and associated data structures.…”
Section: Related Workmentioning
confidence: 99%
“…And, it can be considered as the Hop-count value of a source and destination pair. In fact, calculating the Hop-count value is not a direct operation, since the initial values used in the TTL field are not fixed and vary based on the Operating Systems [15,16].…”
Section: Introductionmentioning
confidence: 99%
“…Mopari et al [14] proposed a method for detecting a DDoS attack and defending against a particular type of attack, namely IP spoofing, by maintaining an IP-hop count table and analyzing it (a hop count filter) to detect malicious packets and drop them. Tupakula et al [15] discuss the effect of TCP SYN and reflection DDoS attacks by preventing the attacker traffic from passing through the ingress router that is nearest to the attack source.…”
Section: Related Workmentioning
confidence: 99%
“…In the paper (Mopari et al, 2008) DDOS attacks are classified into volume based attacks, protocol based attacks and application layer based attacks. In the following table detailed classification of DDOS attacks is shown.…”
Section: • Victimmentioning
confidence: 99%
“…In Mopari et al (2008) a mechanism which is focused on detection and rejection of false packets is shown. Packet authenticity is checked by the estimated number of jumps required for packet to reach its destination.…”
Section: • Victimmentioning
confidence: 99%