• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Qu Haipeng, Li Dequan, Su Purui, Feng Dengguo. An IP Traceback Scheme with Packet Marking in Blocks[J]. Journal of Computer Research and Development, 2005, 42(12): 2084-2092.
Citation: Qu Haipeng, Li Dequan, Su Purui, Feng Dengguo. An IP Traceback Scheme with Packet Marking in Blocks[J]. Journal of Computer Research and Development, 2005, 42(12): 2084-2092.

An IP Traceback Scheme with Packet Marking in Blocks

More Information
  • Published Date: December 14, 2005
  • DDoS attack is a big problem to the Internet community due to its high-profile, severe damage, and the difficulty in defending against it. Several countermeasures are proposed for it in the literature, among which, probabilistic packet marking (PPM) first developed by Savage et al is promising. However, the PPM marking schemes have the limitations in two main aspects: high computation overhead and large number of false positives. An IP traceback scheme with packet marking in blocks is proposed, which is more practical because of higher precision, and computationally more efficient compared with the PPM scheme proposed by Savage.
  • Related Articles

    [1]Pan Yuting, Lin Li. A Trust-Based DDoS Discovery Approach for Encrypted Traffic in Cloud Environment[J]. Journal of Computer Research and Development, 2021, 58(4): 822-833. DOI: 10.7544/issn1000-1239.2021.20200183
    [2]Zhang Long, Wang Jinsong. DDoS Attack Detection Model Based on Information Entropy and DNN in SDN[J]. Journal of Computer Research and Development, 2019, 56(5): 909-918. DOI: 10.7544/issn1000-1239.2019.20190017
    [3]Liu Zihao, Zhang Bin, Zhu Ning, Tang Huilin. Adaptive App-DDoS Detection Method Based on Improved AP Algorithm[J]. Journal of Computer Research and Development, 2018, 55(6): 1236-1246. DOI: 10.7544/issn1000-1239.2018.20170124
    [4]Du Haipeng, Zheng Qinghua, Zhang Weizhan, Yan Jifeng. A Packet Loss Differentiation Algorithm for 4G-LTE Network[J]. Journal of Computer Research and Development, 2015, 52(12): 2684-2694. DOI: 10.7544/issn1000-1239.2015.20150726
    [5]Li Baohui, Xu Kefu, Zhang Peng, Guo Li. pTrace: A Counter Technology of DDoS Attack Source for Controllable Cloud Computing[J]. Journal of Computer Research and Development, 2015, 52(10): 2212-2223. DOI: 10.7544/issn1000-1239.2015.20150577
    [6]Wang Yichuan, Ma Jianfeng, Lu Di, Zhang Liumei, Meng Xianjia. Game Optimization for Internal DDoS Attack Detection in Cloud Computing[J]. Journal of Computer Research and Development, 2015, 52(8): 1873-1882. DOI: 10.7544/issn1000-1239.2015.20140608
    [7]Huang Liang, Feng Dengguo, Lian Yifeng, Chen Kai. Artificial-Neural-Network-Based DDoS Defense Effectiveness Evaluation[J]. Journal of Computer Research and Development, 2013, 50(10): 2100-2108.
    [8]Xie Dongqing, Zhou Zaihong, Luo Jiawei. An Algorithm Based on LRU and SCBF for Elephant Flows Identification and Its Application in DDoS Defense[J]. Journal of Computer Research and Development, 2011, 48(8): 1517-1523.
    [9]Liu Tong, Li Huawei, Li Xiaowei, Gong Shuguang. A Sub-Tuple-Partition-Based Fast Two-Dimensional Packet Classification Algorithm[J]. Journal of Computer Research and Development, 2006, 43(10): 1797-1803.
    [10]Zhou Dongqing, Zhang Haifeng, Zhang Shaowu, Hu Xiangpei. A DDoS Attack Detection Method Based on Hidden Markov Model[J]. Journal of Computer Research and Development, 2005, 42(9): 1594-1599.

Catalog

    Article views (710) PDF downloads (836) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return