Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Distributed Denial of Service Attack and DefenseAttack Source Traceback

Distributed Denial of Service Attack and Defense: Attack Source Traceback [In this chapter, we investigate the attack source traceback in DDoS defence. We summarize the three major traceback methods to date: probabilistic packet marking, deterministic packet marking and network traffic based traceback methods. We formulate each traceback method, and present analysis for them, respectively.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Distributed Denial of Service Attack and DefenseAttack Source Traceback

Loading next page...
 
/lp/springer-journals/distributed-denial-of-service-attack-and-defense-attack-source-Dt8zKVNGGW
Publisher
Springer New York
Copyright
© The Author(s) 2014
ISBN
978-1-4614-9490-4
Pages
55 –75
DOI
10.1007/978-1-4614-9491-1_4
Publisher site
See Chapter on Publisher Site

Abstract

[In this chapter, we investigate the attack source traceback in DDoS defence. We summarize the three major traceback methods to date: probabilistic packet marking, deterministic packet marking and network traffic based traceback methods. We formulate each traceback method, and present analysis for them, respectively.]

Published: Oct 15, 2013

Keywords: Attack Tree; Edge Router; Entropy Variation; Local Router; Attack Flow

There are no references for this article.