Reflector attack belongs to one of the most serious types of Distributed Denial-of-Service (DDoS) attacks, which can hardly be traced by traceback techniques, since the marked information written by any routers between the attacker and the reflectors will be lost in the replied packets from the reflectors. In response to such attacks, advanced IP traceback technology must be suggested. This study proposed a NS-2 based traceback system for simulating iTrace technique that identifies DDoS traffics with multi-hop iTrace mechanism based on TTL information at reflector for malicious reflector source trace. According to the result of simulation, the proposed technique reduced network load and improved filter/traceback performance on distributed reflector attacks1. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Lee, H. W., Kwon, T., & Kim, H. J. (2005). NS-2 based IP traceback simulation against reflector based DDoS attack. In Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science) (Vol. 3397, pp. 90–99). Springer Verlag. https://doi.org/10.1007/978-3-540-30583-5_10
Mendeley helps you to discover research relevant for your work.