A Brief Survey of IP Traceback Methodologies

被引:0
|
作者
Murugesan, Vijayalakshmi [1 ]
Shalinie, Mercy [1 ]
Neethimani, Nithya [1 ]
机构
[1] Thigarajar Coll Engn, Dept Comp Sci & Engn, Madurai 625015, Tamil Nadu, India
关键词
Survey; Review; IP Traceback; Spoofed IP address; DDoS Attack; Packet Marking; Logging; Hybrid; PACKET MARKING; NETWORK; ATTACKS;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The problem of identifying DDoS (Distributed Denial of Service) Attack is one of the prevalent threats in the field of Internet security. The difficulty lies in distinguishing the attack traffic from the normal traffic, as their attack origin is often hidden. Several techniques are used to detect and identify the source of DDoS attack. One of the most popular techniques in identifying the attack source is the IP traceback mechanism. Different kinds of traceback approaches are proposed with each having its own advantages and disadvantages. This paper presents and evaluates some of the existing and recently evolving IP traceback techniques with respect to their pros and cons.
引用
收藏
页码:197 / 216
页数:20
相关论文
共 50 条
  • [21] New algorithm NA for IP traceback
    Xia, Chun-He
    Shi, Yun-Ping
    Zhao, Qin-Ping
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2004, 41 (04): : 689 - 696
  • [22] Opportunistic Piggyback Marking for IP Traceback
    Cheng, Long
    Divakaran, Dinil Mon
    Lim, Wee Yong
    Thing, Vrizlynn L. L.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) : 273 - 288
  • [23] IP Traceback Schemes for DDoS Attack
    Mandhar, Vipul
    Ranga, Virender
    NETWORKING COMMUNICATION AND DATA KNOWLEDGE ENGINEERING, VOL 1, 2018, 3 : 37 - 50
  • [24] A Prediction Based Approach to IP Traceback
    Kiremire, Ankunda R.
    Brust, Matthias R.
    Phoha, Vir V.
    PROCEEDINGS OF THE 37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN 2012), 2012, : 1022 - 1029
  • [25] A packet marking scheme for IP traceback
    Qu, HP
    Su, PR
    Lin, DD
    Feng, DG
    NETWORKING - ICN 2005, PT 2, 2005, 3421 : 964 - 971
  • [26] An Efficient and Adaptive IP Traceback Scheme
    Iwamoto, Kayoko
    Soshi, Masakazu
    Satoh, Takashi
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED COMPUTING AND APPLICATIONS (SOCA), 2014, : 235 - 240
  • [27] Ant-based IP traceback
    Lai, Gu Hsin
    Chen, Chia-Mei
    Jeng, Bing-Chiang
    Chao, Willanis
    EXPERT SYSTEMS WITH APPLICATIONS, 2008, 34 (04) : 3071 - 3080
  • [28] IP traceback using header compression
    Aljifri, H
    Smets, M
    Pons, A
    COMPUTERS & SECURITY, 2003, 22 (02) : 136 - 151
  • [29] STUDY ON IP TRACEBACK SYSTEM FOR DDoS
    Chae, Cheol-Joo
    Kim, Bong-Han
    Lee, Jae-Kwang
    ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL ISAS-1: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, VOL 1, 2008, : 279 - +
  • [30] IP traceback techniques for intrusion tracking
    Nur, MM
    Syed, MR
    Bignall, RJ
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 384 - 388