Publication:
IP traceback system for denial-of-service attacks

dc.contributor.authorSuratose Tritilanunten_US
dc.contributor.authorThananon Salakiten_US
dc.contributor.authorPatchpon Achwacheewanthornkulen_US
dc.contributor.otherMahidol Universityen_US
dc.date.accessioned2018-11-09T02:14:34Z
dc.date.available2018-11-09T02:14:34Z
dc.date.issued2014-01-01en_US
dc.description.abstract© 2014 IEEE. Tracing denial-of-service (DoS) attacks back to their source is a difficult task for network administrators. The source of attacks, sometimes, comes from a single source or multiple sources that makes harder to an investigator to trace attackers back to their original computer. In order to make attacks more difficult to discover, sophisticated attackers could hide their original IP address by using spoofing techniques, or they can cover themselves by launching attacks behind the proxy. This paper provides a detection and IP traceback mechanism that be able to identify a source of DoS attacks in three different scenarios. By setting up the experiment, the experimental results demonstrate that our approach is able to detect a computer that generates denial-of-service attacks, even these attacks are located behind a proxy.en_US
dc.identifier.citationProceedings - 2014 International Conference on Information Science, Electronics and Electrical Engineering, ISEEE 2014. Vol.3, (2014), 1868-1871en_US
dc.identifier.doi10.1109/InfoSEEE.2014.6946246en_US
dc.identifier.other2-s2.0-84913599463en_US
dc.identifier.urihttps://repository.li.mahidol.ac.th/handle/123456789/33848
dc.rightsMahidol Universityen_US
dc.rights.holderSCOPUSen_US
dc.source.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84913599463&origin=inwarden_US
dc.subjectEngineeringen_US
dc.titleIP traceback system for denial-of-service attacksen_US
dc.typeConference Paperen_US
dspace.entity.typePublication
mu.datasource.scopushttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84913599463&origin=inwarden_US

Files

Collections