2002
DOI: 10.1109/4236.991439
|View full text |Cite
|
Sign up to set email alerts
|

Tracing network attacks to their sources

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
38
0
1

Year Published

2005
2005
2017
2017

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 84 publications
(39 citation statements)
references
References 3 publications
0
38
0
1
Order By: Relevance
“…Tatsuya Baba and Shigeyuki Matsuda [10] proposed a different method for logging. For storing data in the router logging method uses sliding time window.…”
Section: Logging:-mentioning
confidence: 99%
“…Tatsuya Baba and Shigeyuki Matsuda [10] proposed a different method for logging. For storing data in the router logging method uses sliding time window.…”
Section: Logging:-mentioning
confidence: 99%
“…Input debugging is one implementation of the link testing mechanism [16]. A feature already exists on many routers.…”
Section: Traceback Mechanism With Traffic Monitoringmentioning
confidence: 99%
“…The former assumes that the entire network is under control while the latter assume that an AS may consist of different administrative policies on Copyright c 2011 The Institute of Electronics, Information and Communication Engineers Input debugging Investigate packet based on a packet digest or a signature to identify the link used for attack. [16] Packet Monitoring…”
Section: Taxonomy Of Traceback Mechanismsmentioning
confidence: 99%
“…One possible way to counter DDoS attacks is to trace the attack sources [17] and punish the perpetrators. However, current Internet design makes such tracing difficult in two aspects.…”
Section: Introductionmentioning
confidence: 99%