NS-2 based IP traceback simulation against reflector based DDoS attack

5Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Reflector attack belongs to one of the most serious types of Distributed Denial-of-Service (DDoS) attacks, which can hardly be traced by traceback techniques, since the marked information written by any routers between the attacker and the reflectors will be lost in the replied packets from the reflectors. In response to such attacks, advanced IP traceback technology must be suggested. This study proposed a NS-2 based traceback system for simulating iTrace technique that identifies DDoS traffics with multi-hop iTrace mechanism based on TTL information at reflector for malicious reflector source trace. According to the result of simulation, the proposed technique reduced network load and improved filter/traceback performance on distributed reflector attacks1. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Lee, H. W., Kwon, T., & Kim, H. J. (2005). NS-2 based IP traceback simulation against reflector based DDoS attack. In Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science) (Vol. 3397, pp. 90–99). Springer Verlag. https://doi.org/10.1007/978-3-540-30583-5_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free