The Community for Technology Leaders
Green Image
Issue No. 02 - February (2007 vol. 40)
ISSN: 0018-9162
pp: 54-58
Vaarun Vijairaghavan , IBM India Software Labs
Darshak Shah , IBM India Systems and Technology Labs
Pallavi Galgali , IBM India Systems and Technology Labs
Amit Shah , Synygy India
Nikhil Shah , Synygy India
Venkatesh Srinivasan , Zensar Technologies
A new method for identifying denial-of-service attacks uses the attacker's media access control address for identification and traceback. The technique pinpoints the boundary router the attacker is connected to, allows identification after the attack, and imposes minimal extra load on the network.
network security, Denial-of-service attacks, Internet Protocol traceback
Vaarun Vijairaghavan, Darshak Shah, Pallavi Galgali, Amit Shah, Nikhil Shah, Venkatesh Srinivasan, Lokesh Bhatia, "Marking Technique to Isolate Boundary Router and Attacker", Computer, vol. 40, no. , pp. 54-58, February 2007, doi:10.1109/MC.2007.66
81 ms
(Ver 3.3 (11022016))