Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation (ISCCCA 2013)

The Improvement Scheme Based on SIPT

Authors
Jieying Lao, Zhilei Sun
Corresponding Author
Jieying Lao
Available Online February 2013.
DOI
10.2991/isccca.2013.23How to use a DOI?
Keywords
Dos attack, attack source, path-reconstruction
Abstract

Speedy IP Traceback method (SIPT) is deficient in monitoring and position attack sources, this paper puts forward an improvement scheme based on SIPT, it only marks two-three times for the packet on the key locations, and the propose also overload rarely used fields on IP packet header to store the checkpoint information, which can traceback the attack source use these marking information, which would help to attack path-reconstruction with a low false-positive rate as a guid.

Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation (ISCCCA 2013)
Series
Advances in Intelligent Systems Research
Publication Date
February 2013
ISBN
10.2991/isccca.2013.23
ISSN
1951-6851
DOI
10.2991/isccca.2013.23How to use a DOI?
Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Jieying Lao
AU  - Zhilei Sun
PY  - 2013/02
DA  - 2013/02
TI  - The Improvement Scheme Based on SIPT
BT  - Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation (ISCCCA 2013)
PB  - Atlantis Press
SP  - 91
EP  - 93
SN  - 1951-6851
UR  - https://doi.org/10.2991/isccca.2013.23
DO  - 10.2991/isccca.2013.23
ID  - Lao2013/02
ER  -