Mathematical models of IP traceback methods and their verification

1Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

IP traceback is a technology for finding distributed-denial-of-service (DDoS) attackers. Various IP traceback methods have been proposed. When a new method is proposed, a performance comparison with the conventional methods is required. In this paper, mathematical models of ICMP, probabilistic packet marking, hash-based, and Kai's improved ICMP method are proposed. The mathematical models proposed can be applied to arbitrary network topologies, and are applicable for evaluating the performance of a new traceback. The mathematical models are verified by comparing the theoretical values with actual measurements of a network of about 600 nodes. Copyright © 2005 by International Federation for Information Processing.

Cite

CITATION STYLE

APA

Ohmori, K., Suzuki, A., Ohmuro, M., Kai, T., Kawabata, M., Matushima, R., & Nishiyama, S. (2005). Mathematical models of IP traceback methods and their verification. In IFIP Advances in Information and Communication Technology (Vol. 181, pp. 155–169). https://doi.org/10.1007/0-387-25660-1_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free