Asian Journal of Information Technology

Year: 2010
Volume: 9
Issue: 3
Page No. 154 - 158

A Survey of Routing Instability with IP Spoofing on the Internet

Authors : D. Srinath, J. Janet and Jose Anand

References

CERT, 2000. Advisory CA-96.21. TCP SYN flooding and IP spoofing. http://www.cert.org/advisories/CA-1996-21.html.

Chang, R.K.C., 2002. Defending against flooding-based distributed denial-of-service attacks: A tutorial. IEEE Commun. Magaz., 40: 42-51.
Direct Link  |  

Chen, C. and Q. Song, 2005. Perimeter-based defense against high bandwidth DDoS attacks. IEEE Trans. Parallel. Distrib. Syst., 16: 526-537.
Direct Link  |  

Chen, R., J.M. Park and R. Marchany, 2007. A divide-and-conquer strategy for thwarting distributed denial-of-service attacks. IEEE Trans. Parallel Distrib. Syst., 18: 577-588.
Direct Link  |  

Cheng, J., W. Haining and G.S. Kang, 2002. Hop-count filtering: An effective defense against spoofed traffic. Proceedings of the 10th Conference on Computer and Communications Security, October 27-30, 2002, New York, USA., pp: 30-41.

Dean, D., M. Franklin and A. Stubblefield, 2002. An algebraic approach to IP traceback. ACM Trans. Inform. Syst. Secur., 5: 119-137.
CrossRef  |  

Dietrich, S., N. Long and D. Dittrich, 2000. Analyzing distributed denial of service tools: The shaft ease. Proceedings of USENIX LISA, Dec. 3-8, New Orleans, La, USA., pp: 329-339.

Duan, Z., X. Yuan and J. Chandrashekar, 2008. Controlling IP spoofing through interdomain packet filters. IEEE Trans. Dependable Secure Comput., 5: 22-36.
Direct Link  |  

Fadlallah, A. and A. Serhrouchni, 2006. PSAT: Proactive signaling architecture for IP traceback. Proceedings of the 4th Annual Communication Networks and Services Research Conference, May 24-25, IEEE Computer Society, Washington, DC, USA., pp: 293-299.

Feng, W., E. Kaiser and A. Luu, 2005. Design and implementation of network puzzles Proc. IEEE INFOCOM, 4: 2372-2382.
Direct Link  |  

Gao, L., 2001. On inferring autonomous system relationships in the internet. IEEE/ACM Trans. Network., 9: 733-745.
Direct Link  |  

Lin, C.H., J.C. Liu, H.C. Huang and T.C. Yang, 2008. Using adaptive bandwidth allocation approach to defend DDoS attacks. Proceedings of the International Conference on Multimedia and Ubiquitous Engineering, April 24-26, IEEE Computer Society, Washington, DC, USA., pp: 176-181.

Liu, X., X. Yang, D. Wetherall and T. Anderson, 2006. Efficient and secure source authentication with packet passport. Proceedings of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet-Volume 2, (SRUTI'06), San Jose, CA., pp: 2-2.

Mahajan, R., S.M. Bellovin, S. Floyd, J. Joannidis, V. Paxson and S. Shenker, 2002. Controlling high bandwidth aggregates in the network. J. Comput. Commun. Rev., 32: 62-73.
Direct Link  |  

Park, K. and H. Lee, 2001. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. Proceedings of the Conference on Applications, Technologies, Architectures and Protocols for Computer Communications, August 27-31, 2001, San Diego, CA., USA., pp: 15-26.

Santiraveewan, V. and Y. Permpoontanalarp, 2004. A Graph-based methodology for analyzing IP spoofing attack. Proceedings of the 18th International Conference on Advanced Information Networking and Application Volume 2, March 29-31, IEEE Computer Society, Washington, DC, USA., pp: 227-227.

Savage, A., D. Wetheralle, A. Karlin and T. Anderson, 2000. Practical network support for IP trace back ACM SIGCOMM Comput. Commun. Rev., 30: 295-306.
Direct Link  |  

Shen, Y., J. Bi, J. Wu and Q. Liu, 2008. A two-level source address spoofing prevention based on automatic signature and verification mechanism. Proceedings of the 13th IEEE Symposium on Computers and Communications, July 6-9, Tsinghua University, Beijing, pp: 392-397.

Snyder, M.E., R. Sundaram and M. Thakur, 2007. A game-theoretic framework for bandwidth attacks and statistical defenses. Proceedings of 32nd IEEE Conference on Local Computer Networks, Oct. 15-18, IEEE Computer Society, Washington, DC, USA., pp: 556-563.

Song, S. and C.N. Manjkopoulos, 2006. IP Spoofing Detection Approach (ISDA) for network intrusion detection system. Proceedings of the IEEE Sarnoff Symposium, March 27-28, IEEE Computer Society, Washington, DC, USA., pp: 1-4.

Sung, M. and J. Xu, 2003. IP traceback-based intelligent packet filtering: A novel technique for defending against internet DDoS attacks. IEEE Trans. Parallel Distrib. Syst., 14: 861-872.
Direct Link  |  

Venkatesu, N., V. Deepan-Chakravarthy and D. Sathya, 2008. An effective defense against distributed denial of service in grid. Proceedings of the 1st International Conference on Emerging Trends in Engineering and Technology, July 16-18, IEEE Computer Society Washington, DC, USA., pp: 373-378.

Wang, H., C. Jin and K.G. Shin, 2007. Defense against spoofed IP traffic using hop-count filtering. IEEE/ACM Trans. Network., 15: 40-53.
Direct Link  |  

Yaar, A., A. Perrig and D. Song, 2003. Pi: A path identification mechanism to defend against DDoS attacks. Proceedings of IEEE Symposium in Security and Privacy, May 11-14, IEEE Computer Society, Berkeley, CA, USA., pp: 93-93.

Yau, D.K.Y., J.C.S. Lui and Y. Yam, 2005 2005. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. IEEE/ACM Trans. Network., 13: 29-42.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved