A Novel Hybrid Technique for Internet Protocol Traceback
Abstract
In addition, to we use a packet’s reference field to sensor attack traffic on its upstream routers. Lastly, we reproduce and analyze our proposal, in comparison with some other related investigation,in the aspects of: storage requirement, computation, and accuracy.
Keywords
Trace back IP; CAIDA ; IP Spoofing; Path reconstruction; Dos Attacks; Router Interface
Full Text:
PDFCopyright (c) 2015 G. Veera Swamy, A. Arun
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
All published Articles are Open Access at https://journals.pen2print.org/index.php/ijr/
Paper submission: ijr@pen2print.org