Author:
Bhavani Y.,Janaki V.,Sridevi R.
Reference15 articles.
1. Burch H, Cheswick B. Tracing anonymous packets to their approximate source. In: Proceedings of USENIX LISA; 2000. p. 319–27.
2. Savage S, Wetherall D, Karlin A, Anderson T. Practical network support for IP Traceback. In: Proc of ACM SIGCOMM conference; 2000.
3. Song DX, Perrig A. Advanced and authenticated marking schemes for IP Traceback. In: Proc of IEEE INFOCOM; April 2001. p. 878–86.
4. An algebraic approach to IP Traceback;Dean;ACM Trans Inform Syst Secur,2001
5. Snoeren AC, Partridge C, Sanchez LA, Jones CE, Tchakountio F, Kent ST, et al. Hash-based IP Traceback. In: Proc ACM SIGCOMM; August 2001.
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Security Policy to Manage Responses to DDoS Attacks on 5G IoT Enabled Devices;2022 13th International Conference on Information and Communication Systems (ICICS);2022-06-21
2. DDoS Threats and Solutions for 5G-Enabled IoT Networks;Smart Sensors, Measurement and Instrumentation;2022
3. IP Traceback using Flow Based Classification;Recent Advances in Computer Science and Communications;2020-08-12
4. IP Traceback Through Modified Probabilistic Packet Marking Algorithm Using Record Route;Proceedings of the Third International Conference on Computational Intelligence and Informatics;2020
5. LPM: A lightweight authenticated packet marking approach for IP traceback;Computer Networks;2018-07