Sciweavers

382 search results - page 5 / 77
» Tracing Network Attacks to Their Sources
Sort
View
SEC
2007
13 years 9 months ago
A Survey of Bots Used for Distributed Denial of Service Attacks
Abstract. In recent years, we have seen the arrival of Distributed Denial-ofService (DDoS) open-source bot-based attack tools facilitating easy code enhancement, and so resulting i...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
JPDC
2006
87views more  JPDC 2006»
13 years 7 months ago
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks
Any packet destined to a honeypot machine (that is, a decoy server machine) is most probably an attack packet. We propose honeypot back-propagation, a scheme that traces attack pa...
Sherif M. Khattab, Rami G. Melhem, Daniel Moss&eac...
ICNP
2002
IEEE
14 years 13 days ago
Attacking DDoS at the Source
Distributed denial-of-service (DDoS) attacks present an Internet-wide threat. We propose D-WARD, a DDoS defense system deployed at source-end networks that autonomously detects an...
Jelena Mirkovic, Gregory Prier, Peter L. Reiher
EUC
2006
Springer
13 years 11 months ago
A Lightweight IP Traceback Mechanism on IPv6
Due to the stateless nature of the internet, it is an intricate problem to determine the source of spoofed attacking packets. To handle this problem we utilize the IP traceback mec...
Syed Obaid Amin, Myung Soo Kang, Choong Seon Hong
CORR
2006
Springer
143views Education» more  CORR 2006»
13 years 7 months ago
Efficient Route Tracing from a Single Source
Traceroute is a networking tool that allows one to discover the path that packets take from a source machine, through the network, to a destination machine. It is widely used as a...
Benoit Donnet, Philippe Raoult, Timur Friedman