Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Overview of Traceback Mechanisms and Their Applicability

Full metadata record
DC Field Value Language
dc.contributor.authorYoum, Heung-Youl-
dc.date.accessioned2021-08-12T04:46:42Z-
dc.date.available2021-08-12T04:46:42Z-
dc.date.issued2011-11-
dc.identifier.issn0916-8532-
dc.identifier.issn1745-1361-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/16128-
dc.description.abstractAs an increasing number of businesses and services depend on the Internet, protecting them against DDoS (Distributed Denial of Service) attacks becomes a critical issue. A traceback is used to discover technical information concerning the ingress points, paths, partial paths or sources of a packet or packets causing a problematic network event. The traceback mechanism is a useful tool to identify the attack source of the (DDoS) attack, which ultimately leads to preventing against the DDoS attack. There are numerous traceback mechanisms that have been proposed by many researchers. In this paper, we analyze the existing traceback mechanisms, describe the common security capabilities of traceback mechanisms, and evaluate them in terms of the various criteria. In addition, we identify typical application of traceback mechanisms.-
dc.format.extent10-
dc.language영어-
dc.language.isoENG-
dc.publisherOxford University Press-
dc.titleOverview of Traceback Mechanisms and Their Applicability-
dc.typeArticle-
dc.publisher.location일본-
dc.identifier.doi10.1587/transinf.E94.D.2077-
dc.identifier.scopusid2-s2.0-80155179767-
dc.identifier.wosid000296673400003-
dc.identifier.bibliographicCitationIEICE Transactions on Information and Systems, v.E94D, no.11, pp 2077 - 2086-
dc.citation.titleIEICE Transactions on Information and Systems-
dc.citation.volumeE94D-
dc.citation.number11-
dc.citation.startPage2077-
dc.citation.endPage2086-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.subject.keywordPlusPACKET MARKING-
dc.subject.keywordPlusIP TRACEBACK-
dc.subject.keywordPlusNETWORK-
dc.subject.keywordAuthortraceback-
dc.subject.keywordAuthorpacket logging-
dc.subject.keywordAuthorpacket marking-
dc.subject.keywordAuthoroverlay network-
dc.subject.keywordAuthorhybrid traceback-
dc.subject.keywordAuthordenial of service-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Youm, Heung youl photo

Youm, Heung youl
College of Software Convergence (Department of Information Security Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE