Survey of IP Traceback Methods in Distributed Denial of Service (DDoS) Attacks

Provided by: International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)
Topic: Security
Format: PDF
Tracing DoS attack that employ source address spoofing is an important and challenging problem. It is important to protect the resource and trace from the Distributed Denial of Service (DDoS) attack, but it is difficult to distinguish normal traffic and DoS attack traffic because the DoS generally hide their identities/origins. Especially the attackers often use incorrect or spoofed source IP address, so tracing the source of the denial of service is hardest in internet. So many techniques and methodologies are used to trace the DDoS attacks.

Find By Topic