Title :
Marking Technique to Isolate Boundary Router and Attacker
Author :
Vijairaghavan, Vaarun ; Shah, Darshak ; Galgali, Pallavi ; Shah, Amit ; Shah, Nikhil ; Srinivasan, Venkatesh ; Bhatia, Lokesh
Author_Institution :
India Software Labs., IBM
Abstract :
A new method for identifying denial-of-service attacks uses the attacker´s media access control address for identification and traceback. The technique pinpoints the boundary router the attacker is connected to, allows identification after the attack, and imposes minimal extra load on the network
Keywords :
computer network management; security of data; telecommunication network routing; telecommunication security; attack identification; boundary router isolation; denial-of-service attacks; marking technique; media access control; Communication system traffic control; Computer crime; Debugging; Floods; Information filtering; Information filters; Performance evaluation; Telecommunication traffic; Testing; Web and internet services; Denial-of-service attacks; Internet Protocol traceback; network security;