Title : 
Design and implementation of FDPM in network processor
         
        
            Author : 
Zeng, Kun ; Li, Zhongwen ; He, Shan
         
        
            Author_Institution : 
Kan Tah Kee Coll., Xiamen Univ., Xiamen, China
         
        
        
        
        
        
            Abstract : 
Notorious Distributed Denial of Service (DDoS) attacks consume a remote host or network resource to deny or degrade service to legitimate users. They have been identified as serious problems currently. Many mechanisms have been proposed to defend against DDoS attacks. IP traceback is a very important technology in these mechanisms. It provides the security system with the ability to identify the true source of the attacking IP packets. Flexible Deterministic Packet Marking (FDPM) is one of the IP traceback approaches. It only needs moderately a small number of packets to complete the IP traceback process. The implementation of FDPM in network processor demonstrates that FDPM is a good traceback method and the network processor can defend effectively against DDoS attacks.
         
        
            Keywords : 
IP networks; computer network security; IP traceback; attacking IP packets; distributed denial of service attacks; flexible deterministic packet marking; network processor; Computer crime; Encoding; IP networks; Protocols; Random access memory; Software; DDoS; FDPM; IP traceback; network processor; packet marking;
         
        
        
        
            Conference_Titel : 
Anti-Counterfeiting, Security and Identification (ASID), 2011 IEEE International Conference on
         
        
            Conference_Location : 
Xiamen
         
        
        
            Print_ISBN : 
978-1-61284-631-6
         
        
        
            DOI : 
10.1109/ASID.2011.5967434