Skip to main content

2018 | OriginalPaper | Buchkapitel

IP Traceback Schemes for DDoS Attack

verfasst von : Vipul Mandhar, Virender Ranga

Erschienen in: Networking Communication and Data Knowledge Engineering

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays the Internet is exposed to a span of web threats. In the modernized era, multifarious types of attacks are discovered on the Internet, along with the utmost disastrous attack, Distributed Denial of Service (DDoS) attacks. In such course of attacks, an immense number of settle arrangement tie in with one another to make the services baseless for honest users. These composed systems frequently mask their existence by counterfeit technique. IP traceback is a way used to catch the real path of web packets in such scenario. This paper provides a schematized investigation of various IP traceback approaches with their fruitful domain and doorway for forthcoming research in this thrust expanse of IP traceback.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Santhanam, Lakshmi, Anup Kumar, and Dharma P. Agrawal. “Taxonomy of IP traceback.” Journal of Information Assurance and security 1, no. 1 (2006): 79–94. Santhanam, Lakshmi, Anup Kumar, and Dharma P. Agrawal. “Taxonomy of IP traceback.” Journal of Information Assurance and security 1, no. 1 (2006): 79–94.
3.
Zurück zum Zitat Singh, Karanpreet, Paramvir Singh, and Krishan Kumar. “A systematic review of IP traceback schemes for denial of service attacks.” Computers & Security 56 (2016): 111–139. Singh, Karanpreet, Paramvir Singh, and Krishan Kumar. “A systematic review of IP traceback schemes for denial of service attacks.” Computers & Security 56 (2016): 111–139.
4.
Zurück zum Zitat Savage, Stefan, David Wetherall, Anna Karlin, and Tom Anderson. “Network support for IP traceback.” IEEE/ACM Transactions on Networking (TON) 9, no. 3 (2001): 226–237. Savage, Stefan, David Wetherall, Anna Karlin, and Tom Anderson. “Network support for IP traceback.” IEEE/ACM Transactions on Networking (TON) 9, no. 3 (2001): 226–237.
5.
Zurück zum Zitat Song, Dawn Xiaodong, and Adrian Perrig. “Advanced and authenticated marking schemes for IP traceback.” In INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 2, pp. 878–886. IEEE, 2001. Song, Dawn Xiaodong, and Adrian Perrig. “Advanced and authenticated marking schemes for IP traceback.” In INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 2, pp. 878–886. IEEE, 2001.
6.
Zurück zum Zitat Belenky, Andrey, and Nirwan Ansari. “IP traceback with deterministic packet marking.” IEEE communications letters 7, no. 4 (2003): 162–164. Belenky, Andrey, and Nirwan Ansari. “IP traceback with deterministic packet marking.” IEEE communications letters 7, no. 4 (2003): 162–164.
7.
Zurück zum Zitat Foroushani, Vahid Aghaei, and A. Nur Zincir-Heywood. “TDFA: traceback-based defense against DDoS flooding attacks.” In 2014 IEEE 28th International Conference on Advanced Information Networking and Applications, pp. 597–604. IEEE, 2014. Foroushani, Vahid Aghaei, and A. Nur Zincir-Heywood. “TDFA: traceback-based defense against DDoS flooding attacks.” In 2014 IEEE 28th International Conference on Advanced Information Networking and Applications, pp. 597–604. IEEE, 2014.
8.
Zurück zum Zitat Yang, Ming-Hour, and Ming-Chien Yang. “RIHT: a novel hybrid IP traceback scheme.” IEEE Transactions on Information Forensics and Security 7, no. 2 (2012): 789–797. Yang, Ming-Hour, and Ming-Chien Yang. “RIHT: a novel hybrid IP traceback scheme.” IEEE Transactions on Information Forensics and Security 7, no. 2 (2012): 789–797.
9.
Zurück zum Zitat Roy, Sangita, Anurag Singh, and Ashok Singh Sairam. “IP traceback in star colored networks.” In 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS), pp. 1–9. IEEE, 2013. Roy, Sangita, Anurag Singh, and Ashok Singh Sairam. “IP traceback in star colored networks.” In 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS), pp. 1–9. IEEE, 2013.
10.
Zurück zum Zitat Muthuprasanna, Muthusrinivasan, G. Manimaran, Mansoor Alicherry, and Vijay Kumar. “Coloring the Internet: IP traceback.” In 12th International Conference on Parallel and Distributed Systems-(ICPADS’06), vol. 1, pp. 8-pp. IEEE, 2006. Muthuprasanna, Muthusrinivasan, G. Manimaran, Mansoor Alicherry, and Vijay Kumar. “Coloring the Internet: IP traceback.” In 12th International Conference on Parallel and Distributed Systems-(ICPADS’06), vol. 1, pp. 8-pp. IEEE, 2006.
11.
Zurück zum Zitat Wang, Ping, Hui-Tang Lin, and Tzy-Shiah Wang. “An improved ant colony system algorithm for solving the IP traceback problem.” Information Sciences 326 (2016): 172–187. Wang, Ping, Hui-Tang Lin, and Tzy-Shiah Wang. “An improved ant colony system algorithm for solving the IP traceback problem.” Information Sciences 326 (2016): 172–187.
12.
Zurück zum Zitat Yaar, Abraham, Adrian Perrig, and Dawn Song. “FIT: fast Internet traceback.” In Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., vol. 2, pp. 1395–1406. IEEE, 2005. Yaar, Abraham, Adrian Perrig, and Dawn Song. “FIT: fast Internet traceback.” In Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., vol. 2, pp. 1395–1406. IEEE, 2005.
13.
Zurück zum Zitat Lai, Gu Hsin, Chia-Mei Chen, Bing-Chiang Jeng, and Willams Chao. “Ant-based IP traceback.” Expert Systems with Applications 34, no. 4 (2008): 3071–3080. Lai, Gu Hsin, Chia-Mei Chen, Bing-Chiang Jeng, and Willams Chao. “Ant-based IP traceback.” Expert Systems with Applications 34, no. 4 (2008): 3071–3080.
14.
Zurück zum Zitat Gu Hsin Lai, Chia-Mei Chen, Bing-Chiang Jeng, Willams Chao, “Ant-based IP traceback”, Expert Systems with Applications 34 (2008) pp. 3071–3080. Gu Hsin Lai, Chia-Mei Chen, Bing-Chiang Jeng, Willams Chao, “Ant-based IP traceback”, Expert Systems with Applications 34 (2008) pp. 3071–3080.
Metadaten
Titel
IP Traceback Schemes for DDoS Attack
verfasst von
Vipul Mandhar
Virender Ranga
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-4585-1_4

Neuer Inhalt