The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - February (2007 vol.40)
pp: 54-58
Vaarun Vijairaghavan , IBM India Software Labs
Darshak Shah , IBM India Systems and Technology Labs
Pallavi Galgali , IBM India Systems and Technology Labs
Amit Shah , Synygy India
Nikhil Shah , Synygy India
Venkatesh Srinivasan , Zensar Technologies
ABSTRACT
A new method for identifying denial-of-service attacks uses the attacker's media access control address for identification and traceback. The technique pinpoints the boundary router the attacker is connected to, allows identification after the attack, and imposes minimal extra load on the network.
INDEX TERMS
network security, Denial-of-service attacks, Internet Protocol traceback
CITATION
Vaarun Vijairaghavan, Darshak Shah, Pallavi Galgali, Amit Shah, Nikhil Shah, Venkatesh Srinivasan, Lokesh Bhatia, "Marking Technique to Isolate Boundary Router and Attacker", Computer, vol.40, no. 2, pp. 54-58, February 2007, doi:10.1109/MC.2007.66
18 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool