Attack source traceback
Version 2 2024-06-05, 05:29Version 2 2024-06-05, 05:29
Version 1 2023-10-25, 05:29Version 1 2023-10-25, 05:29
chapter
posted on 2024-06-05, 05:29 authored by S Yu© The Author(s) 2014. In this chapter, we investigate the attack source traceback in DDoS defence. We summarize the three major traceback methods to date: probabilistic packet marking, deterministic packet marking and network traffic based traceback methods. We formulate each traceback method, and present analysis for them, respectively.
History
Related Materials
- 1.
Publication classification
BN Other book chapter, or book chapter not attributed to DeakinEditor/Contributor(s)
Yu SPagination
55-75ISSN
2191-5768eISSN
2191-5776ISBN-13
978-1-4614-9491-1Publisher
SpringerTitle of book
Distributed Denial of Service Attack and DefenseSeries
SpringerBriefs in Computer ScienceUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC

