Ashok Singh Sairam, Sangita Roy and Rishikesh Sahay Coloring networks for attacker identification and response Security and Communication Networks 8
In this paper, we use distance-2 coloring to traceback and mitigate distributed denial of service attacks. Routers probabilistically mark packets with their color but deterministically compute the path identifier (PID). Victim uses the PID to discriminate incoming packets and collect them in separate groups. Finally, the packets are sorted based on their count to construct the attack path. Performance analysis shows that the scheme is robust to Time To Live spoofing, color spoofing, and multi party traceback.
Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf