Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
An evaluation of different IP traceback approaches
Luleå tekniska universitet.
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Embedded Internet Systems Lab.
Luleå tekniska universitet.
2002 (English)In: Proceedings of the 4th International Conference on Information and Communications Security / [ed] Robert Deng, Berlin: Encyclopedia of Global Archaeology/Springer Verlag, 2002, 37-48 p.Conference paper, Published paper (Refereed)
Abstract [en]

The problem of identifying the sources of a denial of service attack is among the hardest in the Internet security area, especially since attackers often use incorrect, or spoofed, source IP addresses. In this paper we present the results from a comparison between some of the most promising traceback techniques proposed to solve this problem. Our goal was to evaluate and analyse the most promising techniques on our way to find a more efficient approach. We have evaluated four different traceback approaches and summarized the results. Our own research were primary targeted at the iTrace approaches while the other approaches were evaluated based on the previous work. We conclude that there are two main disadvantages of the proposed approaches. First, the hop-byhop path reconstruction is inefficient due to a significant computation overhead, or a long time spent for collecting the samples of the path. Second, the path reconstruction requires changes in the core routing structure that is not profitable. We also suggest a slightly modified version of iTrace approach which aims at reducing the overhead imposed by such changes.

Place, publisher, year, edition, pages
Berlin: Encyclopedia of Global Archaeology/Springer Verlag, 2002. 37-48 p.
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 2513
Identifiers
URN: urn:nbn:se:ltu:diva-31784Local ID: 60fb1290-1b7a-11dd-8c59-000ea68e967bISBN: 3-540-00164-6 (print)OAI: oai:DiVA.org:ltu-31784DiVA: diva2:1005018
Conference
International Conference on Information and Communications Security : 09/12/2002 - 12/12/2002
Note
Validerad; 2002; 20080506 (ysko)Available from: 2016-09-30 Created: 2016-09-30 Last updated: 2017-11-25Bibliographically approved

Open Access in DiVA

fulltext(165 kB)13 downloads
File information
File name FULLTEXT01.pdfFile size 165 kBChecksum SHA-512
0fb5e1e613e8d190d81abe166a695e252f62913f8ed911b64f02fc3ddbe3cbb02544884fefd03f6c0b39bbe78e82d7d579fd42c4257b0d58ed7161e336101812
Type fulltextMimetype application/pdf

Authority records BETA

Sandström, Helena

Search in DiVA

By author/editor
Sandström, Helena
By organisation
Embedded Internet Systems Lab

Search outside of DiVA

GoogleGoogle Scholar
Total: 13 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 8 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf