Search For:

Displaying 1-3 out of 3 total
Deterministic and Authenticated Flow Marking for IP Traceback
Found in: 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA)
By Vahid Aghaei Foroushani,A. Nur Zincir-Heywood
Issue Date:March 2013
pp. 397-404
In this paper, we present a novel approach to IP trace back - Deterministic Flow Marking (DFM) - which allows the victim to trace back the origin of incorrect or spoofed source addresses up to the attacker node, even if the attack has been originated from ...
 
TDFA: Traceback-Based Defense against DDoS Flooding Attacks
Found in: 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA)
By Vahid Aghaei Foroushani,A. Nur Zincir-Heywood
Issue Date:May 2014
pp. 597-604
Distributed Denial of Service (DDoS) attacks are one of the challenging network security problems to address. The existing defense mechanisms against DDoS attacks usually filter the attack traffic at the victim side. The problem is exacerbated when there a...
 
On Evaluating IP Traceback Schemes: A Practical Perspective
Found in: 2013 IEEE CS Security and Privacy Workshops (SPW2013)
By Vahid Aghaei-Foroushani,A. Nur Zincir-Heywood
Issue Date:May 2013
pp. 127-134
This paper presents an evaluation of two promising schemes for tracing cyber-attacks, the well-known Deterministic Packet Marking, DPM, and a novel marking scheme for IP traceback, Deterministic Flow Marking, DFM. First of all we explore the DPM in detail ...
   
 1