The Survey for IP Traceback

Article Preview

Abstract:

IP traceback can be used to confirm locations of attackers, stop on-going attacks, and take legal actions against attackers, and then impede attackers. This paper describes the background where IP traceback problem generates, and presents what the functions of IP traceback are. Furthermore, this paper classifies existing IP traceback methods and analyzes advantages and disadvantages of each method. In addition, future researches on IP traceback are proposed. This paper is of valuable reference for network researchers and engineers to be engaged in the further study on IP traceback.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1339-1342

Citation:

Online since:

October 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] S. Savage, D. Wetherall and A. Karlin: Proc. ACM SIGCOMM Conference (Stockholm, Sweden, August 28 - September 1, 2000). Vol. 1, p.295.

Google Scholar

[2] R. Stone: Proc. the 9th Usenix Security Symp (Denver, USA, August 14-17, 2000). Vol. 1, p.199.

Google Scholar

[3] H. Burch, B. Cheswick: Proc. USENIX Systems Administration Conference(New Orleans, Louisiana, December 3-8, 2000). Vol. 1, p.319.

Google Scholar

[4] A. Belenky, N. Ansari: Proc. IEEE Pacific Rim Conference on Communications, Computers and signal Processing (Newark, USA, August 28-30, 2003). Vol. 1, p.49.

Google Scholar

[5] B. Al-Duwairi and G. Manimaran: Proc. 10th International Conference on Parallel and Distributed Systems (Newport Beach, USA, July 7-9, 2004). Vol. 1, p.719.

Google Scholar

[6] Information on http: /blrc. edu. cn/blrcweb/publication/kc1. pdf.

Google Scholar

[7] D. Dean, M. Franklin and A. Stublefield: ACM Transactions on Information and System Security, Vol. 5 (2002), No. 2, pp.120-137.

Google Scholar

[8] A. Mankin, D. Massey, C. Wu: Proc. IEEE International Conference on Computer Communications and networks (Scottsdale, USA, October 15-17, 2001). Vol. 1, p.213.

Google Scholar

[9] H.C.J. Lee, V.L.L. Thing, Y. Xu and M. Ma: Proc. Fourth International Conference on Information, Communications & Signal Processing (Singapore, December 15-18, 2003), Vol. 1, p.124.

Google Scholar