Journal of Engineering and Applied Sciences

Year: 2012
Volume: 7
Issue: 5
Page No. 383 - 386

Effective Analysis of Distributed Denial of Service Attacks Using IP Traceback Algorithm

Authors : G. Jeya Bharathi and B. Santhi

References

Belenky, A. and N. Ansari, 2003. IP traceback with deterministic packet marking. IEEE Commun. Lett., 7: 162-164.
CrossRef  |  Direct Link  |  

Chen, L.C., T.A. Longstaffv and K.M. Carley, 2004. Characterization of defense mechanisms against distributed denial of service attacks. Comput. Secur., 23: 665-678.

Dean, D., M. Franklin and A. Stubblefield, 2002. An algebraic approach to IP traceback. ACM Trans. Inform. Syst. Secur., 5: 119-137.
CrossRef  |  

Garber, L., 2000. Denial-of-service attacks rip the internet. Computer, 33: 12-17.
CrossRef  |  Direct Link  |  

Gong, C. and K. Sarac, 2008. A more practical approach for single-packet ip traceback using packet logging and marking. Proceeding of the IEEE Transactions on Parallel and Distributed Systems, Volume: 19, October 19-23, 2008, Rochester, New York, pp: 1310-1324.

Kevin T., 2001. Tutorial-Virus Malicious Agents. University of Calgary, Alberta, Canada..

Law, T.K.T., J.C.S. Lui and D.K.Y. Yau, 2005. You can run, but you can`t hide: An effective statistical methodology to trace back DDoS attackers. IEEE Trans. Parallel Distributed Syst., 16: 799-813.
CrossRef  |  

Mirkovic, J. and R. Peter, 2004. A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev., 34: 39-53.
Direct Link  |  

Savage, S., D. Wetherall, A. Karlin and T. Anderson, 2001. Practical network support for IP traceback. IEEE/ACM Trans. Network., 9: 226-237.
Direct Link  |  

Snoeren, A.C., C. Partridge, L.A. Sanchez, C.E. Jones and F. Tchakountio et al., 2002. Single-packet IP traceback. IEEE/ACM Trans. Network., 10: 721-734.
CrossRef  |  Direct Link  |  

Snoeren, A.C., C. Partridge, L.A. Sanchez, Jones, C.E., F. Tchakountio, S.T. Kent and W.T. Strayer, 2001. Hash-based IP traceback. Proceedings of the ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures and Protocols for Computer Communication, August 27-31, 2001, San Diego, California, USA., pp: 3-14.

Weaver, N., 2001. Warhol worms: The potential for very fast internet plagues. http://www.iwar.org.uk/comsec/resources/worms/warholworm.

Weaver, N., 2002. Potential strategies for high speed active worms: A worst case analysis. http://www.ccert.edu.cn/upload/2/1.pdf.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved