DocumentCode :
1089507
Title :
Marking Technique to Isolate Boundary Router and Attacker
Author :
Vijairaghavan, Vaarun ; Shah, Darshak ; Galgali, Pallavi ; Shah, Amit ; Shah, Nikhil ; Srinivasan, Venkatesh ; Bhatia, Lokesh
Author_Institution :
India Software Labs., IBM
Volume :
40
Issue :
2
fYear :
2007
Firstpage :
54
Lastpage :
58
Abstract :
A new method for identifying denial-of-service attacks uses the attacker´s media access control address for identification and traceback. The technique pinpoints the boundary router the attacker is connected to, allows identification after the attack, and imposes minimal extra load on the network
Keywords :
computer network management; security of data; telecommunication network routing; telecommunication security; attack identification; boundary router isolation; denial-of-service attacks; marking technique; media access control; Communication system traffic control; Computer crime; Debugging; Floods; Information filtering; Information filters; Performance evaluation; Telecommunication traffic; Testing; Web and internet services; Denial-of-service attacks; Internet Protocol traceback; network security;
fLanguage :
English
Journal_Title :
Computer
Publisher :
ieee
ISSN :
0018-9162
Type :
jour
DOI :
10.1109/MC.2007.66
Filename :
4085623
Link To Document :
بازگشت