Suratose TritilanuntThananon SalakitPatchpon AchwacheewanthornkulMahidol University2018-11-092018-11-092014-01-01Proceedings - 2014 International Conference on Information Science, Electronics and Electrical Engineering, ISEEE 2014. Vol.3, (2014), 1868-18712-s2.0-84913599463https://repository.li.mahidol.ac.th/handle/123456789/33848© 2014 IEEE. Tracing denial-of-service (DoS) attacks back to their source is a difficult task for network administrators. The source of attacks, sometimes, comes from a single source or multiple sources that makes harder to an investigator to trace attackers back to their original computer. In order to make attacks more difficult to discover, sophisticated attackers could hide their original IP address by using spoofing techniques, or they can cover themselves by launching attacks behind the proxy. This paper provides a detection and IP traceback mechanism that be able to identify a source of DoS attacks in three different scenarios. By setting up the experiment, the experimental results demonstrate that our approach is able to detect a computer that generates denial-of-service attacks, even these attacks are located behind a proxy.Mahidol UniversityEngineeringIP traceback system for denial-of-service attacksConference PaperSCOPUS10.1109/InfoSEEE.2014.6946246