E-mail

E-mail a Wiley Online Library Link

Ashok Singh Sairam, Sangita Roy and Rishikesh Sahay Coloring networks for attacker identification and response Security and Communication Networks

Article first published online: 19 JUL 2014 | DOI: 10.1002/sec.1022

Thumbnail image of graphical abstract

In this paper, we use distance-2 coloring to traceback and mitigate distributed denial of service attacks. Routers probabilistically mark packets with their color but deterministically compute the path identifier (PID). Victim uses the PID to discriminate incoming packets and collect them in separate groups. Finally, the packets are sorted based on their count to construct the attack path. Performance analysis shows that the scheme is robust to Time To Live spoofing, color spoofing, and multi party traceback.

Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf

Required = Required Field

Choose captcha format: Image or Audio. Click here if you need help.

SEARCH