Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices
With the advent of the Internet of Things (IoT), there are also major information security risks hidden behind them. There are major information security risks hidden behind them. Attackers can conceal their actual attack locations by spoofing IP addresses to attack IoT devices, law enforcement cann...
Main Authors: | Ming-Hour Yang, Jia-Ning Luo, M. Vijayalakshmi, S. Mercy Shalinie |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9240996/ |
Similar Items
-
PERFORMANCE EVALUATION OF A TTL-BASED DYNAMIC MARKING SCHEME IN IP TRACEBACK
by: Devasundaram, Shanmuga Sundaram
Published: (2006) -
Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT
by: Cusack, B, et al.
Published: (2018) -
On Distributed Denial of Service Current Defense Schemes
by: Seth Djane Kotey, et al.
Published: (2019-01-01) -
Forensic Traceback Methods: Designing an Improved Investigation Framework
by: Tian, Zhuang
Published: (2019) -
Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet Marking
by: Dube, Raghav
Published: (2005)