Citation itrace6/17/2023 IEEE Draft Standard for Management Information Base (MIB) Definitions for Ethernet. Rather than attempt to cite individual contributors to this particular manual (and run the risk of excluding somebody, either past or present), we simply. In: 15th International Conference on Advanced Computing and Communications (ADCOM 2007), pp. Izaddoost, A., Othman, M., Rasid, M.F.A.: Accurate ICMP Traceback Model under DoS/DDoS ATTACK. Computer Communications and Networks, pp. Mankin, A., Massey, D., Wu, C.L., Wu, S.F., Zhang, L.: On Design and Evaluation of Intention-Driven ICMP Traceback. Maletic: Determining Differences in Reading Behavior Between Experts and Novices by Investigating Eye Movement on Source Code Constructs During a Bug Fixing Task. Year Author Paper Title DOI 2021: Salwa Aljehane, Bonita Sharif, Jonathan I. In: Third International Conference on Communications and Networking in China (ChinaCom 2008), pp. iTrace - Citations Papers that cite i-Trace. Tsunoda, H., Tochiori, T., Waizumi, Y., Kato, N., Nemoto, Y.: Improving the Efficiency of DoS Traceback Based on the Enhanced ITrace-CP Method for Mobile Environment (Invited Paper). In: IEEE 61st Vehicular Technology Conference (VTC 2005-Spring), vol. 4, pp. Thing, V.L.L., Lee, H.C.J., Sloman, M., Zhou, J.: Enhanced ICMP Traceback with Cumulative Path. In: 5th International Conference on Information and Communications Security, pp. Lee, H.C.J., Thing, V.L.L., Xu, Y., Ma, M.: ICMP Traceback with Cumulative Path, An Efficient Solution for IP Traceback. IEEE/ACM Transactions on Networking (TON) 9(3), 226–237 (2001)īellovin, S., Leech, M., Taylor, T.: ICMP Traceback Messages. Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Network Support for IP Traceback. Snoeren, A.C., Partridge, C., Sanchez, L.A., Jones, C.E., Tchakountio, F., Kent, S.T., Strayer, W.T.: Hash-Based IP Traceback. Through our implementations on a platform, we validated our approach and demonstrated the feasibility of practical network forensics. This research proposes a novel approach to embed the essence of a management information base (MIB) into iTrace messages, named MIB-ITrace-CP, in order to improve the accuracy and efficiency of the original ICMP-based Traceback. Although the Internet Engineer Task Force (IETF) has proposed an Internet Control Message Protocol (ICMP) based Traceback solution, it faces severe difficulties in practice in regard to justifying the interoperability of deployed routers as well as the correctness of Traceback with multiple attack paths. For stepping-stone and masquerading techniques typically used in DoS/DDoS attacks such as internet protocol (IP) or Media Access Control (MAC) address spoofing, tracing the intrusion back to the true attacker becomes a challenging task for network security engineers. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as work in progress. A denial-of-service (DoS) / distributed-denial-of-service (DDoS) attack may result in rapid resource depletion along the attack path.
0 Comments
Leave a Reply. |