Overview of Traceback Mechanisms and Their Applicability
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Youm, Heung-Youl | - |
dc.date.accessioned | 2021-08-12T04:46:42Z | - |
dc.date.available | 2021-08-12T04:46:42Z | - |
dc.date.issued | 2011-11 | - |
dc.identifier.issn | 0916-8532 | - |
dc.identifier.issn | 1745-1361 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/16128 | - |
dc.description.abstract | As an increasing number of businesses and services depend on the Internet, protecting them against DDoS (Distributed Denial of Service) attacks becomes a critical issue. A traceback is used to discover technical information concerning the ingress points, paths, partial paths or sources of a packet or packets causing a problematic network event. The traceback mechanism is a useful tool to identify the attack source of the (DDoS) attack, which ultimately leads to preventing against the DDoS attack. There are numerous traceback mechanisms that have been proposed by many researchers. In this paper, we analyze the existing traceback mechanisms, describe the common security capabilities of traceback mechanisms, and evaluate them in terms of the various criteria. In addition, we identify typical application of traceback mechanisms. | - |
dc.format.extent | 10 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Oxford University Press | - |
dc.title | Overview of Traceback Mechanisms and Their Applicability | - |
dc.type | Article | - |
dc.publisher.location | 일본 | - |
dc.identifier.doi | 10.1587/transinf.E94.D.2077 | - |
dc.identifier.scopusid | 2-s2.0-80155179767 | - |
dc.identifier.wosid | 000296673400003 | - |
dc.identifier.bibliographicCitation | IEICE Transactions on Information and Systems, v.E94D, no.11, pp 2077 - 2086 | - |
dc.citation.title | IEICE Transactions on Information and Systems | - |
dc.citation.volume | E94D | - |
dc.citation.number | 11 | - |
dc.citation.startPage | 2077 | - |
dc.citation.endPage | 2086 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.subject.keywordPlus | PACKET MARKING | - |
dc.subject.keywordPlus | IP TRACEBACK | - |
dc.subject.keywordPlus | NETWORK | - |
dc.subject.keywordAuthor | traceback | - |
dc.subject.keywordAuthor | packet logging | - |
dc.subject.keywordAuthor | packet marking | - |
dc.subject.keywordAuthor | overlay network | - |
dc.subject.keywordAuthor | hybrid traceback | - |
dc.subject.keywordAuthor | denial of service | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.