Abstract
We propose a new approach for IP traceback which is scalable and simple to implement, and introduces no bandwidth and practically no processing overhead. It is backward compatible with equipment which does not implement it. The approach is capable of tracing back attacks, which are composed of just a few packets. In addition, a service provider can implement this scheme without revealing its internal network topology.
Original language | English (US) |
---|---|
Pages (from-to) | 162-164 |
Number of pages | 3 |
Journal | IEEE Communications Letters |
Volume | 7 |
Issue number | 4 |
DOIs | |
State | Published - Apr 2003 |
All Science Journal Classification (ASJC) codes
- Modeling and Simulation
- Computer Science Applications
- Electrical and Electronic Engineering
Keywords
- IP traceback
- Security