Sciweavers

ACSW
2006

Analysis of traceback techniques

14 years 2 months ago
Analysis of traceback techniques
Today's Internet is extremely vulnerable to Distributed Denial of service (DDoS) attacks. There is tremendous pressure on the sites performing online business and ISP's to protect their networks from DDoS attacks. Recently, several novel traceback techniques have been proposed to trace the approximate spoofed source of attack. Each proposed traceback technique has some unique advantages and disadvantages over the others. In this paper we will consider some of the novel traceback techniques and focus our discussion i) to raise some of the real time issues that can be addressed in the further research and ii) from the attackers perspective on how to generate DDoS attacks and remain untraced even if any of the traceback technique is deployed in the Internet. We will also demonstrate how attacks can be further amplified if ICMP traceback technique is deployed in the Internet and discuss techniques to minimise the additional attack traffic. . We believe that the networks tend to ...
Udaya Kiran Tupakula, Vijay Varadharajan
Added 30 Oct 2010
Updated 30 Oct 2010
Type Conference
Year 2006
Where ACSW
Authors Udaya Kiran Tupakula, Vijay Varadharajan
Comments (0)