DDoS: Survey of Traceback Methods

Free registration required

Executive Summary

The problem of identifying Distributed Denial of Service (DDoS) is one of the hardest threats in the internet security. It is important to protect the resource and trace from the Denial of Service (DoS) attack, but it is difficult to distinguish normal traffic and DoS attack traffic because the DoS generally hide their identities/origins. Especially the attackers often use incorrect or spoofed source IP address, so tracing the source of the denial of service is hardest in internet. Lot of techniques and methodologies are used to trace the DDoS attacks. This paper presents some of the mostly used predicting traceback techniques to solve the problem. The main goal of this paper is appraise the different traceback techniques of the DDoS.

  • Format: PDF
  • Size: 270.6 KB