Download Now Free registration required
Majority of the network host today are threatened by the network attacks like Denial-of-Service (DoS) attack, Distributed DoS (DDoS) attack. The path identification scheme described in this paper can trace back an individual packet back to its source. The routers along the path of the packet mark the packet based on deterministic marking scheme with effective storage requirement by using hash based technique. The attack diagnosis is done at the victim's side and the filtering of the packet is done at the routers near to the source Index terms-computer attacks, network level security and protection, DoS attack.
- Format: PDF
- Size: 93.9 KB