2018
DOI: 10.1007/978-3-030-00410-1_21
|View full text |Cite
|
Sign up to set email alerts
|

Improved Single Packet Traceback Scheme with Bloom Filters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…To resolve the complication whereby these devices process only the link-layer packet header, link-layer tracing technology was employed in this study. TAP was used for packet mirroring for the switch, and the packet log table, and the bloom filter was used to record the port of the switch from which the packet had entered to traceback the packet source in the link layer [44][46] [47]. To efficiently identify the movement path of attack packets traversing the entire Internet and entering the LAN, the researchers proposed a packet traceback that integrates the network layer and link layer to trace the attacker device sending attack packets.…”
Section: A Marking and Logging Mechanismsmentioning
confidence: 99%
“…To resolve the complication whereby these devices process only the link-layer packet header, link-layer tracing technology was employed in this study. TAP was used for packet mirroring for the switch, and the packet log table, and the bloom filter was used to record the port of the switch from which the packet had entered to traceback the packet source in the link layer [44][46] [47]. To efficiently identify the movement path of attack packets traversing the entire Internet and entering the LAN, the researchers proposed a packet traceback that integrates the network layer and link layer to trace the attacker device sending attack packets.…”
Section: A Marking and Logging Mechanismsmentioning
confidence: 99%