On deterministic packet marking
From MaRDI portal
Publication:885124
DOI10.1016/J.COMNET.2006.11.020zbMATH Open1120.68304OpenAlexW1977467230MaRDI QIDQ885124FDOQ885124
Authors: Andrey Belenky, Nirwan Ansari
Publication date: 8 June 2007
Published in: Computer Networks (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.comnet.2006.11.020
Recommendations
Cited In (17)
- Trade-offs in probabilistic packet marking for IP traceback
- Title not available (Why is that?)
- Tabu marking scheme to speedup IP traceback
- Applied Cryptography and Network Security
- LIPS: a lightweight permit system for packet source origin accountability
- A practical and robust inter-domain marking scheme for IP traceback
- Title not available (Why is that?)
- Title not available (Why is that?)
- Dynamic probabilistic packet marking for efficient ip traceback
- The Time for Reconstructing the Attack Graph in DDoS Attacks
- Deterministic Packet Marking with Link Signatures for IP Traceback
- An authenticated deterministic packet marking scheme
- Trace malicious source to guarantee cyber security for mass monitor critical infrastructure
- Honeypot back-propagation for mitigating spoofing distributed denial-of-service attacks
- Applied Cryptography and Network Security
- A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths
- Information and Communications Security
This page was built for publication: On deterministic packet marking
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q885124)