Back to Results
First PageMeta Content
Internet / Routing protocols / Denial-of-service attacks / IP traceback / Denial-of-service attack / Router / IP address spoofing / Traffic flow / Protocol Independent Multicast / Computing / Network architecture / Computer network security


You Can Run, But You Can’t Hide: An Effective Methodology to Traceback DDoS Attackers K.T. Law Department of Computer Science & Engineering The Chinese University of
Add to Reading List

Document Date: 2004-06-10 15:32:10


Open Document

File Size: 140,02 KB

Share Result on Facebook

City

Boston / New York / Stockholm / Hash / /

Company

Amazon / eBay / Yahoo / PWSKent Publishing Company / /

Country

Sweden / /

/

Facility

Carnegie Mellon University / Engineering The Chinese University / Stable Time To / /

IndustryTerm

adjacent routers / downstream routers / database integration management / victim site / internet draft / closest routers / sufficient processing power / attack tools / probabilistic marking algorithm / nearest router / attack graph construction algorithm / upstream router / illustrative linear network / furthest routers / probabilistic edge marking algorithm / upstream routers / flood network / Internet core / closet routers / graph construction algorithm / false router / lin ear network / furthest router / /

Organization

Chinese University of Hong Kong / CSE Department / Traceback DDoS Attackers K.T. Law Department of Computer Science / Purdue University / Department of Computer Science / Carnegie Mellon University / Internet Society / /

Person

Even Distributed / David K.Y. Yau / Savage / John C.S. Lui / Song / E. Steven M. Bellovin / F. Liang / John Wiley / /

/

Position

Prime Minister / packet routing/forward / Dean / /

Product

Franklin / /

ProvinceOrState

New York / /

Technology

Attack Graph Construction Algorithm / 2 R1 Router Router / two routers / furthest router / nearest router / furthest routers / remaining routers / corresponding routers / tcp/ip protocol / IP protocol / closet routers / adjacent routers / upstream router / originated router / marking algorithm / 25 routers / graph construction algorithm / three furthest routers / probabilistic marking algorithm / 3 closest routers / ISP / participating routers / dom / Simulation / participating router / downstream routers / upstream routers / /

URL

http /

SocialTag