The Community for Technology Leaders
Green Image
Issue No. 02 - February (2007 vol. 40)
ISSN: 0018-9162
pp: 54-58
Vaarun Vijairaghavan , IBM India Software Labs
Darshak Shah , IBM India Systems and Technology Labs
Pallavi Galgali , IBM India Systems and Technology Labs
Amit Shah , Synygy India
Nikhil Shah , Synygy India
Venkatesh Srinivasan , Zensar Technologies
A new method for identifying denial-of-service attacks uses the attacker's media access control address for identification and traceback. The technique pinpoints the boundary router the attacker is connected to, allows identification after the attack, and imposes minimal extra load on the network.
network security, Denial-of-service attacks, Internet Protocol traceback

L. Bhatia et al., "Marking Technique to Isolate Boundary Router and Attacker," in Computer, vol. 40, no. , pp. 54-58, 2007.
91 ms
(Ver 3.3 (11022016))