The Community for Technology Leaders
Green Image
Issue No. 02 - February (2007 vol. 40)
ISSN: 0018-9162
pp: 54-58
Amit Shah , Synygy India
Pallavi Galgali , IBM India Systems and Technology Labs
Venkatesh Srinivasan , Zensar Technologies
Vaarun Vijairaghavan , IBM India Software Labs
Nikhil Shah , Synygy India
Darshak Shah , IBM India Systems and Technology Labs
A new method for identifying denial-of-service attacks uses the attacker's media access control address for identification and traceback. The technique pinpoints the boundary router the attacker is connected to, allows identification after the attack, and imposes minimal extra load on the network.
network security, Denial-of-service attacks, Internet Protocol traceback
Lokesh Bhatia, Amit Shah, Pallavi Galgali, Venkatesh Srinivasan, Vaarun Vijairaghavan, Nikhil Shah, Darshak Shah, "Marking Technique to Isolate Boundary Router and Attacker", Computer, vol. 40, no. , pp. 54-58, February 2007, doi:10.1109/MC.2007.66
75 ms
(Ver 3.3 (11022016))