On Evaluating IP Traceback Schemes: A Practical Perspective
2013 IEEE CS Security and Privacy Workshops (SPW2013)
By Vahid Aghaei-Foroushani,A. Nur Zincir-Heywood
Issue Date:May 2013
This paper presents an evaluation of two promising schemes for tracing cyber-attacks, the well-known Deterministic Packet Marking, DPM, and a novel marking scheme for IP traceback, Deterministic Flow Marking, DFM. First of all we explore the DPM in detail ...