Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Overview of Traceback Mechanisms and Their Applicability

Authors
Youm, Heung-Youl
Issue Date
Nov-2011
Publisher
Oxford University Press
Keywords
traceback; packet logging; packet marking; overlay network; hybrid traceback; denial of service
Citation
IEICE Transactions on Information and Systems, v.E94D, no.11, pp 2077 - 2086
Pages
10
Journal Title
IEICE Transactions on Information and Systems
Volume
E94D
Number
11
Start Page
2077
End Page
2086
URI
https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/16128
DOI
10.1587/transinf.E94.D.2077
ISSN
0916-8532
1745-1361
Abstract
As an increasing number of businesses and services depend on the Internet, protecting them against DDoS (Distributed Denial of Service) attacks becomes a critical issue. A traceback is used to discover technical information concerning the ingress points, paths, partial paths or sources of a packet or packets causing a problematic network event. The traceback mechanism is a useful tool to identify the attack source of the (DDoS) attack, which ultimately leads to preventing against the DDoS attack. There are numerous traceback mechanisms that have been proposed by many researchers. In this paper, we analyze the existing traceback mechanisms, describe the common security capabilities of traceback mechanisms, and evaluate them in terms of the various criteria. In addition, we identify typical application of traceback mechanisms.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Youm, Heung youl photo

Youm, Heung youl
College of Software Convergence (Department of Information Security Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE