This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Marking Technique to Isolate Boundary Router and Attacker
February 2007 (vol. 40 no. 2)
pp. 54-58
Vaarun Vijairaghavan, IBM India Software Labs
Darshak Shah, IBM India Systems and Technology Labs
Pallavi Galgali, IBM India Systems and Technology Labs
Amit Shah, Synygy India
Nikhil Shah, Synygy India
Venkatesh Srinivasan, Zensar Technologies
A new method for identifying denial-of-service attacks uses the attacker's media access control address for identification and traceback. The technique pinpoints the boundary router the attacker is connected to, allows identification after the attack, and imposes minimal extra load on the network.
Index Terms:
network security, Denial-of-service attacks, Internet Protocol traceback
Citation:
Vaarun Vijairaghavan, Darshak Shah, Pallavi Galgali, Amit Shah, Nikhil Shah, Venkatesh Srinivasan, Lokesh Bhatia, "Marking Technique to Isolate Boundary Router and Attacker," Computer, vol. 40, no. 2, pp. 54-58, Feb. 2007, doi:10.1109/MC.2007.66
Usage of this product signifies your acceptance of the Terms of Use.