File(s) under permanent embargo
Attack source traceback
Version 2 2024-06-05, 05:29Version 2 2024-06-05, 05:29
Version 1 2023-10-25, 05:29Version 1 2023-10-25, 05:29
chapter
posted on 2024-06-05, 05:29 authored by S Yu© The Author(s) 2014. In this chapter, we investigate the attack source traceback in DDoS defence. We summarize the three major traceback methods to date: probabilistic packet marking, deterministic packet marking and network traffic based traceback methods. We formulate each traceback method, and present analysis for them, respectively.
History
Pagination
55-75Publisher DOI
ISSN
2191-5768eISSN
2191-5776ISBN-13
978-1-4614-9491-1Publication classification
BN Other book chapter, or book chapter not attributed to DeakinEditor/Contributor(s)
Yu SPublisher
SpringerTitle of book
Distributed Denial of Service Attack and DefenseSeries
SpringerBriefs in Computer ScienceUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC