CFP last date
20 January 2025
Reseach Article

A Survey on Various Mechanisms and IP Traceback Schemes To Defend DDoS Attacks

Published on September 2016 by Jatin Mahendroo, Vinit Grewal
International Conference on Advances in Emerging Technology
Foundation of Computer Science USA
ICAET2016 - Number 2
September 2016
Authors: Jatin Mahendroo, Vinit Grewal
78ee4dfe-ede7-4f78-b0ef-83e33672bbe4

Jatin Mahendroo, Vinit Grewal . A Survey on Various Mechanisms and IP Traceback Schemes To Defend DDoS Attacks. International Conference on Advances in Emerging Technology. ICAET2016, 2 (September 2016), 38-44.

@article{
author = { Jatin Mahendroo, Vinit Grewal },
title = { A Survey on Various Mechanisms and IP Traceback Schemes To Defend DDoS Attacks },
journal = { International Conference on Advances in Emerging Technology },
issue_date = { September 2016 },
volume = { ICAET2016 },
number = { 2 },
month = { September },
year = { 2016 },
issn = 0975-8887,
pages = { 38-44 },
numpages = 7,
url = { /proceedings/icaet2016/number2/25888-t038/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Emerging Technology
%A Jatin Mahendroo
%A Vinit Grewal
%T A Survey on Various Mechanisms and IP Traceback Schemes To Defend DDoS Attacks
%J International Conference on Advances in Emerging Technology
%@ 0975-8887
%V ICAET2016
%N 2
%P 38-44
%D 2016
%I International Journal of Computer Applications
Abstract

Distributed Denial of Service (DDoS) attacks are the major threat to Internet today that can make the server unavailable for legitimate user and finally take down the service. A number of mechanisms, approaches and various Traceback schemes are developed to defend such attacks. This paper surveys the various defensive techniques and various IP Traceback schemes to prevent various DDoS attacks.

References
  1. S. M. Specht, in:, Proceedings of the International Workshop on Security in Parallel and Distributed Systems, 2004, 2004, pp. 543–550.
  2. Loukas Georgios, Oke Gulay. Protection Against Denial of Service Attacks: A Survey COMPUTER JOURNAL Volume: 53 Issue: 7. SEP 2010 . 1020-1037.
  3. L. Santhanam, A. Kumar, D. P. Agrawal, in:, J. Info. Assurance and Security 1 (2006) 79.
  4. S. O. Amen, C. S. Hong, K. Y. Kim, in:, Y. -T. Kim, M. Takano (Eds. ), Management of Convergence Networks and Services, Springer Berlin Heidelberg (2006) 263.
  5. Saurabh S, SaiRam A. S Linear and Remainder Packet Marking for fast IP Traceback COSMNET, fourth international journal 2012.
  6. Belenky and N. Ansari: On Deterministic Packet Marking, Computer Networks, Vol. 51, No. 10, 2007, pp. 2677-2700
  7. H. Aljifri, M. Smets, A. Pons, Computers & Security 22 (2003) 136.
  8. Savage S, Wetherall D, Karlin A, Anderson T. Practical network support for IP Traceback. In: Proc of ACM SIGCOMM conference; 2000.
  9. Ming-Hour Yang and Ming-Chien Yang "RIHT: A Novel IP Traceback Scheme", IEEE Transactions on information forensics and security, Vol. 7, April 2012.
  10. A. Hussain, J. Heidemann, C. Papadopoulos, in:, Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ACM, New York, NY, USA (2003) 99.
  11. M. Long, C. Wu, J. Hung, Denial of Service Attacks on Network-Based Control Systems: Impact and Mitigation, IEEE Transactions on Industrial Informatics 1 (2) (2005) 85–96.
  12. R. Mahajan, S. M. Bellovin, S. Floyd, Controlling high bandwidth aggregates in the network, ACM SIGCOMM Computer Communication Review 32 (3) (2002) 62–73.
  13. Burch H, Cheswick B. Tracing anonymous packets to their approximate source. In: Proceedings of USENIX LISA; 2000. p. 319–27.
  14. H. Burch, in:, Proceedings of the 14th USENIX Conference on System Administration, USENIX Association, Berkeley, CA, USA (2012) 319.
  15. Kaspersky. DDoS attacks in H2 2011. [serial online] 2012 Feb [cited 2013 Jun 21].
  16. M. -H. Yang, M. -C. Yang, IEEE Transactions on Information Forensics and Security 7 (2012) 789.
  17. A. C. Snoeren et al. : Single-Packet IP Traceback, IEEE/ACM Trans. Networking, Vol. 10, No. 6, Dec. 2002, pp. 721-734
Index Terms

Computer Science
Information Sciences

Keywords

Ddos Attacks Ip Traceback Packet Logging Ppm Dpm Riht Defense Mechanisms.