Security Investigate

Geographical Division Traceback for Thwarting DDoS Using Normal Distribution and Tautological Theorem

Download now Free registration required

Executive Summary

Mitigation is one of the countermeasure to overcome the Distributed Denial of service (DDoS) attack. The delay in the availability of services to the intended users is mainly caused by DDoS attacks done by a mischievous intruder in the internet. In protesting the DDoS attack by various methods, it is unethical to boycott the genuine packet sent by a harmless personnel. In this paper, the authors focus on privilege constraints that apply tautological method to prevent exact packet that harms to the victim. Usually a novel push back mechanism deals with all upstream routers and the victim can trace back the source from which the attack is emerged and pass the command to the Attack Diagnosis (AD) router not to send the troublesome packet further

  • Format: PDF
  • Size: 492.27 KB