skip to main content
RFC2827: Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing2000 RFC
Bibliometrics
Skip Abstract Section
Abstract

Recent occurrences of various Denial of Service (DoS) attacks which have employed forged source addresses have proven to be a troublesome issue for Internet Service Providers and the Internet community overall. This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point.

RFC Downloads

Cited By

  1. Schulmann H and Zhao S Insights into SAV Implementations in the Internet Passive and Active Measurement, (69-87)
  2. ACM
    Yazdani R, Hilton A, van der Ham J, van Rijswijk-Deij R, Deccio C, Sperotto A and Jonker M Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service Attacks Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses, (263-275)
  3. ACM
    Fiebig T and Aschenbrenner D 13 propositions on an internet for a "burning world" Proceedings of the ACM SIGCOMM Joint Workshops on Technologies, Applications, and Uses of a Responsible Internet and Building Greener Internet, (1-5)
  4. Chen K, Liu S, Xu Y, Siddhrau I, Zhou S, Guo Z and Chao H (2021). SDNShield: NFV-Based Defense Framework Against DDoS Attacks on SDN Control Plane, IEEE/ACM Transactions on Networking, 30:1, (1-17), Online publication date: 1-Feb-2022.
  5. ACM
    Wang R, Wang Z, Wang D and Liu Y In-band Network Telemetry Based Fine-Grained Traceability Against IP Address Spooling Attack Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, (229-233)
  6. ACM
    Nawrocki M, Koch M, Schmidt T and Wählisch M Transparent forwarders Proceedings of the 17th International Conference on emerging Networking EXperiments and Technologies, (454-462)
  7. ACM
    Li Y, Li H, Lv Z, Yao X, Li Q and Wu J Deterrence of Intelligent DDoS via Multi-Hop Traffic Divergence Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, (923-939)
  8. ACM
    Gondaliya H, Sankaran G and Sivalingam K Comparative Evaluation of IP Address Anti-Spoofing Mechanisms using a P4/NetFPGA-based Switch Proceedings of the 3rd P4 Workshop in Europe, (1-6)
  9. Alnaim A, Alwakeel A and Fernandez E A misuse pattern for distributed denial-of-service attack in network function virilization Proceedings of the 26th Conference on Pattern Languages of Programs, (1-10)
  10. Pappas C, Lee T, Reischuk R, Szalachowski P and Perrig A (2019). Network Transparency for Better Internet Security, IEEE/ACM Transactions on Networking, 27:5, (2028-2042), Online publication date: 1-Oct-2019.
  11. Liu Z, Cao Y, Zhu M and Ge W (2018). Umbrella: Enabling ISPs to Offer Readily Deployable and Privacy-Preserving DDoS Prevention Services, IEEE Transactions on Information Forensics and Security, 14:4, (1098-1108), Online publication date: 1-Apr-2019.
  12. ACM
    Iordanou C, Smaragdakis G, Poese I and Laoutaris N Tracing Cross Border Web Tracking Proceedings of the Internet Measurement Conference 2018, (329-342)
  13. Bushart J Optimizing recurrent pulsing attacks using application-layer amplification of open DNS resolvers Proceedings of the 12th USENIX Conference on Offensive Technologies, (11-11)
  14. ACM
    Lee T, Pappas C, Szalachowski P and Perrig A Towards Sustainable Evolution for the TLS Public-Key Infrastructure Proceedings of the 2018 on Asia Conference on Computer and Communications Security, (637-649)
  15. De Donno M, Dragoni N, Giaretta A, Spognardi A and Bugliesi M (2018). DDoS-Capable IoT Malwares, Security and Communication Networks, 2018, Online publication date: 1-Jan-2018.
  16. Gupta B and Badve O (2017). Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment, Neural Computing and Applications, 28:12, (3655-3682), Online publication date: 1-Dec-2017.
  17. ACM
    Lichtblau F, Streibelt F, Krüger T, Richter P and Feldmann A Detection, classification, and analysis of inter-domain traffic with spoofed source IP addresses Proceedings of the 2017 Internet Measurement Conference, (86-99)
  18. Hubballi N and Tripathi N (2017). An event based technique for detecting spoofed IP packets, Journal of Information Security and Applications, 35:C, (32-43), Online publication date: 1-Aug-2017.
  19. Xiao L, Wei W, Yang W, Shen Y and Wu X (2017). A protocol-free detection against cloud oriented reflection DoS attacks, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 21:13, (3713-3721), Online publication date: 1-Jul-2017.
  20. ACM
    Krupp J, Backes M and Rossow C Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (1426-1437)
  21. Kalkan K and Alagöz F (2016). A distributed filtering mechanism against DDoS attacks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 108:C, (199-209), Online publication date: 24-Oct-2016.
  22. ACM
    Ke Y, Chen C, Hsiao H, Perrig A and Sekar V CICADAS Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, (699-710)
  23. Al-Qudah Z, Johnson E, Rabinovich M and Spatscheck O (2016). Internet with transient destination-controlled addressing, IEEE/ACM Transactions on Networking, 24:2, (731-744), Online publication date: 1-Apr-2016.
  24. ACM
    Luckie M, Beverly R, Wu T, Allman M and claffy k Resilience of Deployed TCP to Blind Attacks Proceedings of the 2015 Internet Measurement Conference, (13-26)
  25. ACM
    Huz G, Bauer S, claffy k and Beverly R Experience in using MTurk for Network Measurement Proceedings of the 2015 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data, (27-32)
  26. Malialis K and Kudenko D (2015). Distributed response to network intrusions using multiagent reinforcement learning, Engineering Applications of Artificial Intelligence, 41:C, (270-284), Online publication date: 1-May-2015.
  27. ACM
    Naylor D, Mukerjee M and Steenkiste P (2014). Balancing accountability and privacy in the network, ACM SIGCOMM Computer Communication Review, 44:4, (75-86), Online publication date: 25-Feb-2015.
  28. ACM
    Wu H, Hsiao H and Hu Y Efficient Large Flow Detection over Arbitrary Windows Proceedings of the 2014 Conference on Internet Measurement Conference, (209-222)
  29. ACM
    Krylov V and Kravtsov K IP fast hopping protocol design Proceedings of the 10th Central and Eastern European Software Engineering Conference in Russia, (1-5)
  30. ACM
    Naylor D, Mukerjee M and Steenkiste P Balancing accountability and privacy in the network Proceedings of the 2014 ACM conference on SIGCOMM, (75-86)
  31. ACM
    Okada K, Hazeyama H and Kadobayashi Y Oblivious DDoS mitigation with locator/ID separation protocol Proceedings of The Ninth International Conference on Future Internet Technologies, (1-6)
  32. ACM
    Gilad Y and Herzberg A (2014). Off-Path TCP Injection Attacks, ACM Transactions on Information and System Security, 16:4, (1-32), Online publication date: 1-Apr-2014.
  33. ACM
    Husák M and Vizváry M POSTER: Reflected attacks abusing honeypots Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (1449-1452)
  34. Kováčik M, Kajan M and Žádník M Detecting IP spoofing by modelling history of IP address entry points Proceedings of the 7th IFIP WG 6.6 international conference on Autonomous Infrastructure, Management, and Security: emerging management mechanisms for the future internet - Volume 7943, (73-83)
  35. ACM
    Gilad Y and Herzberg A When tolerance causes weakness Proceedings of the 22nd international conference on World Wide Web, (435-446)
  36. ACM
    Gilad Y and Herzberg A (2013). Fragmentation Considered Vulnerable, ACM Transactions on Information and System Security, 15:4, (1-31), Online publication date: 1-Apr-2013.
  37. Donnet B Internet topology discovery DataTraffic Monitoring and Analysis, (44-81)
  38. Yao G, Bi J and Xiao P (2013). VASE, Computer Networks: The International Journal of Computer and Telecommunications Networking, 57:1, (243-257), Online publication date: 1-Jan-2013.
  39. Zhang C, Cai Z, Chen W, Luo X and Yin J (2012). Flow level detection and filtering of low-rate DDoS, Computer Networks: The International Journal of Computer and Telecommunications Networking, 56:15, (3417-3431), Online publication date: 1-Oct-2012.
  40. ACM
    Bedi H and Shiva S Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms Proceedings of the International Conference on Advances in Computing, Communications and Informatics, (463-469)
  41. Gilad Y and Herzberg A Spying in the dark Proceedings of the 12th international conference on Privacy Enhancing Technologies, (100-119)
  42. ACM
    Gilad Y and Herzberg A (2012). LOT, ACM Transactions on Information and System Security, 15:2, (1-30), Online publication date: 1-Jul-2012.
  43. ACM
    Zúquete A and Frade C (2012). A new location layer for the TCP/IP protocol stack, ACM SIGCOMM Computer Communication Review, 42:2, (16-27), Online publication date: 29-Mar-2012.
  44. ACM
    Naous J, Walfish M, Nicolosi A, Mazières D, Miller M and Seehra A Verifying and enforcing network paths with icing Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies, (1-12)
  45. Lagishetty S, Sabbu P and Srinathan K DMIPS Proceedings of the 16th Australasian conference on Information security and privacy, (276-291)
  46. ACM
    Basak D, Toshniwal R, Maskalik S and Sequeira A (2010). Virtualizing networking and security in the cloud, ACM SIGOPS Operating Systems Review, 44:4, (86-94), Online publication date: 13-Dec-2010.
  47. ACM
    McCarthy B, Edwards C, Varakliotis S and Kirstein P Incorporating mobile sensor networks into the internet Proceedings of the fifth ACM international workshop on Mobility in the evolving internet architecture, (15-20)
  48. Acharya H and Gouda M On the power of non-spoofing adversaries Proceedings of the 24th international conference on Distributed computing, (437-449)
  49. Bhattacharjee R, Sanand S and Raghavan S Path attestation scheme to avert DDoS flood attacks Proceedings of the 9th IFIP TC 6 international conference on Networking, (397-408)
  50. Al-Duwairi B and Mustafa A (2010). Request diversion: a novel mechanism to counter P2P based DDoS attacks, International Journal of Internet Protocol Technology, 5:1/2, (55-64), Online publication date: 1-Apr-2010.
  51. ACM
    McCarthy B, Georgopoulos P and Edwards C Intelligent autonomous handover in iMANETs Proceedings of the Second International Workshop on Mobile Opportunistic Networking, (86-92)
  52. Keshariya A and Foukia N DDoS defense mechanisms Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security, (222-236)
  53. ACM
    Xie Y, Yu F and Abadi M (2009). De-anonymizing the internet using unreliable IDs, ACM SIGCOMM Computer Communication Review, 39:4, (75-86), Online publication date: 16-Aug-2009.
  54. ACM
    Xie Y, Yu F and Abadi M De-anonymizing the internet using unreliable IDs Proceedings of the ACM SIGCOMM 2009 conference on Data communication, (75-86)
  55. Huang T, Shieh C and Miao Y (2009). Dual-Mode Execution Environment for active network, Journal of Systems Architecture: the EUROMICRO Journal, 55:5-6, (317-331), Online publication date: 1-May-2009.
  56. ACM
    Ehrenkranz T and Li J (2009). On the state of IP spoofing defense, ACM Transactions on Internet Technology, 9:2, (1-29), Online publication date: 1-May-2009.
  57. ACM
    Lin C, Jiang F, Lai W, Lee W and Hsu W Counteract SYN flooding using second chance packet filtering Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, (216-220)
  58. Ramsurrun V and Soyjaudah K The stateful cluster security gateway (CSG) architecture for robust switched Linux cluster security Proceedings of the Seventh Australasian Conference on Information Security - Volume 98, (109-118)
  59. ACM
    Hayes D, But J and Armitage G (2008). Issues with network address translation for SCTP, ACM SIGCOMM Computer Communication Review, 39:1, (23-33), Online publication date: 31-Dec-2009.
  60. Yang X, Wetherall D and Anderson T (2008). TVA, IEEE/ACM Transactions on Networking, 16:6, (1267-1280), Online publication date: 1-Dec-2008.
  61. Cheng B, Chen H, Li Y and Tseng R (2008). A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks, Computer Communications, 31:18, (4352-4359), Online publication date: 1-Dec-2008.
  62. ACM
    Liu X, Yang X and Lu Y (2008). To filter or to authorize, ACM SIGCOMM Computer Communication Review, 38:4, (195-206), Online publication date: 1-Oct-2008.
  63. Wang X, Guo L, Yang T, Ji W, Li Y, Liu X and Zhang Y (2008). New routing algorithms in trustworthy Internet, Computer Communications, 31:14, (3533-3536), Online publication date: 1-Sep-2008.
  64. Tsunoda H, Ohta K, Yamamoto A, Ansari N, Waizumi Y and Nemoto Y (2008). Detecting DRDoS attacks by a simple response packet confirmation mechanism, Computer Communications, 31:14, (3299-3306), Online publication date: 1-Sep-2008.
  65. ACM
    Liu X, Yang X and Lu Y To filter or to authorize Proceedings of the ACM SIGCOMM 2008 conference on Data communication, (195-206)
  66. Yi Z, Pan L, Wang X, Huang C and Huang B IP Traceback Using Digital Watermark and Honeypot Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing, (426-438)
  67. Liu X, Li A, Yang X and Wetherall D Passport Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, (365-378)
  68. Xiao B, Chen W and He Y (2008). An autonomous defense against SYN flooding attacks, Journal of Parallel and Distributed Computing, 68:4, (456-470), Online publication date: 1-Apr-2008.
  69. Sirhindi R, Basharat A and Cheema A Depth-in-defense approach against DDoS Proceedings of the 6th WSEAS international conference on Information security and privacy, (102-106)
  70. ACM
    Le D, Lei J and Fu X A new decentralized mobility management service architecture for ipv6-based networks Proceedings of the 3rd ACM workshop on Wireless multimedia networking and performance modeling, (54-61)
  71. Norden S and Guo K (2007). Support for resilient Peer-to-Peer gaming, Computer Networks: The International Journal of Computer and Telecommunications Networking, 51:14, (4212-4233), Online publication date: 1-Oct-2007.
  72. Shen Y, Bi J, Wu J and Liu Q The automatic peer-to-peer signature for source address validation Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part I, (855-863)
  73. Topal C and Akinlar C Implementing IPv4+4 addressing architecture with IPv4 LSRR option for seamless peer-to-peer (P2P) communication Proceedings of the 5th international conference on Parallel and Distributed Processing and Applications, (809-820)
  74. ACM
    Wang J and Nelakuditi S IP fast reroute with failure inferencing Proceedings of the 2007 SIGCOMM workshop on Internet network management, (268-273)
  75. Siris V and Stavrakis I (2007). Provider-based deterministic packet marking against distributed DoS attacks, Journal of Network and Computer Applications, 30:3, (858-876), Online publication date: 1-Aug-2007.
  76. Simon D, Agarwal S and Maltz D AS-based accountability as a cost-effective DDoS defense Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, (9-9)
  77. ACM
    Lee H, Kwon M, Hasker G and Perrig A BASE Proceedings of the 2nd ACM symposium on Information, computer and communications security, (20-31)
  78. Maciá-Fernández G, Díaz-Verdejo J and García-Teodoro P (2007). Evaluation of a low-rate DoS attack against iterative servers, Computer Networks: The International Journal of Computer and Telecommunications Networking, 51:4, (1013-1030), Online publication date: 1-Mar-2007.
  79. Vijairaghavan V, Shah D, Galgali P, Shah A, Shah N, Srinivasan V and Bhatia L (2007). Marking Technique to Isolate Boundary Router and Attacker, Computer, 40:2, (54-58), Online publication date: 1-Feb-2007.
  80. Sen J, Chowdhury P and Sengupta I A mechanism for detection and prevention of distributed denial of service attacks Proceedings of the 8th international conference on Distributed Computing and Networking, (139-144)
  81. ACM
    Swami Y and Tschofenig H Protecting mobile devices from TCP flooding attacks Proceedings of first ACM/IEEE international workshop on Mobility in the evolving internet architecture, (63-68)
  82. ACM
    Farhat H Protecting TCP services from denial of service attacks Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, (155-160)
  83. Khattab S, Melhem R, Mossé D and Znati T (2006). Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks, Journal of Parallel and Distributed Computing, 66:9, (1152-1164), Online publication date: 1-Sep-2006.
  84. Tariq U, Hong M and Lhee K A comprehensive categorization of DDoS attack and DDoS defense techniques Proceedings of the Second international conference on Advanced Data Mining and Applications, (1025-1036)
  85. Al-Duwairi B and Manimaran G (2006). Distributed packet pairing for reflector based DDoS attack mitigation, Computer Communications, 29:12, (2269-2280), Online publication date: 1-Aug-2006.
  86. Bi J, Wu J and Zhang M Enable a trustworthy network by source address spoofing prevention routers Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing, (681-691)
  87. Liu X, Yang X, Wetherall D and Anderson T Efficient and secure source authentication with packet passports Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet - Volume 2, (2-2)
  88. Zhang Q and Li X On the generation of fast verifiable IPv6 addresses Proceedings of the 6th international conference on Computational Science - Volume Part IV, (176-179)
  89. Toedtmann B and Rathgeb E Anticipatory distributed packet filter configuration for carrier-grade IP-Networks Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, (928-941)
  90. Maciá-Fernández G, Díaz-Verdejo J and García-Teodoro P Low rate dos attack to monoprocess servers Proceedings of the Third international conference on Security in Pervasive Computing, (43-57)
  91. Kim Y, Lau W, Chuah M and Chao H (2006). PacketScore, IEEE Transactions on Dependable and Secure Computing, 3:2, (141-155), Online publication date: 1-Apr-2006.
  92. Bagnulo M, García-Martínez A, Rodríguez J and Azcorra A (2006). End-site routing support for IPv6 multihoming1, Computer Communications, 29:7, (893-899), Online publication date: 1-Apr-2006.
  93. Cui Y, Song L and Xu K RCS Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks, (764-774)
  94. Lijun W, Ke X and Jianping W BGP route selection notice Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks, (440-449)
  95. Furuya T, Matsuzaki T and Matsuura K Detection of unknown dos attacks by kolmogorov-complexity fluctuation Proceedings of the First SKLOIS conference on Information Security and Cryptology, (395-406)
  96. Kim J, Cho J and Moon J Automated immunization against denial-of-service attacks featuring stochastic packet inspection Proceedings of the 4th international conference on Grid and Cooperative Computing, (25-34)
  97. ACM
    Yang X, Wetherall D and Anderson T (2005). A DoS-limiting network architecture, ACM SIGCOMM Computer Communication Review, 35:4, (241-252), Online publication date: 1-Oct-2005.
  98. Lee H and Yun S Authenticated IPv6 packet traceback against reflector based packet flooding attack Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I, (1118-1124)
  99. Freiling F, Holz T and Wicherski G Botnet tracking Proceedings of the 10th European conference on Research in Computer Security, (319-335)
  100. ACM
    Yang X, Wetherall D and Anderson T A DoS-limiting network architecture Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, (241-252)
  101. Mirkovic J and Reiher P (2005). D-WARD, IEEE Transactions on Dependable and Secure Computing, 2:3, (216-232), Online publication date: 1-Jul-2005.
  102. Malekpour A, Tavangarian D and Daher R Optimizing and reducing the delay latency of mobile IPv6 location management Proceedings of the 5th international conference on Innovative Internet Community Systems, (147-158)
  103. Lee S, Kim Y, Lee B, Kang S and Youn C A probe detection model using the analysis of the fuzzy cognitive maps Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I, (320-328)
  104. Al-Duwairi B and Manimaran G Victim-Assisted mitigation technique for TCP-Based reflector DDoS attacks Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, (191-204)
  105. Ahn G and Kim K Active host information-based abnormal IP address detection Proceedings of the 4th international conference on Networking - Volume Part II, (689-698)
  106. Yau D, Lui J, Liang F and Yam Y (2005). Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles, IEEE/ACM Transactions on Networking, 13:1, (29-42), Online publication date: 1-Feb-2005.
  107. Habib A, Fahmy S and Bhargava B (2005). Monitoring and controlling QoS network domains, International Journal of Network Management, 15:1, (11-29), Online publication date: 1-Jan-2005.
  108. Xiao B, Chen W and He Y A novel technique for detecting DDoS attacks at its early stage Proceedings of the Second international conference on Parallel and Distributed Processing and Applications, (825-834)
  109. Buchholz F and Shields C (2004). Providing process origin information to aid in computer forensic investigations, Journal of Computer Security, 12:5, (753-776), Online publication date: 1-Sep-2004.
  110. ACM
    Bremler-Barr A and Levy H Brief announcement Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing, (375-375)
  111. Douligeris C and Mitrokotsa A (2004). DDoS attacks and defense mechanisms, Computer Networks: The International Journal of Computer and Telecommunications Networking, 44:5, (643-666), Online publication date: 5-Apr-2004.
  112. ACM
    Mirkovic J and Reiher P (2004). A taxonomy of DDoS attack and DDoS defense mechanisms, ACM SIGCOMM Computer Communication Review, 34:2, (39-53), Online publication date: 1-Apr-2004.
  113. ACM
    Siaterlis C and Maglaris B Towards multisensor data fusion for DoS detection Proceedings of the 2004 ACM symposium on Applied computing, (439-446)
  114. Suzuki S Providing Network Services with Multiple Prefix Delegation Proceedings of the 2004 Symposium on Applications and the Internet-Workshops (SAINT 2004 Workshops)
  115. ACM
    Anderson T, Roscoe T and Wetherall D (2004). Preventing Internet denial-of-service with capabilities, ACM SIGCOMM Computer Communication Review, 34:1, (39-44), Online publication date: 1-Jan-2004.
  116. Hsu F and Chiueh T A Path Information Caching and Aggregation Approach to Traffic Source Identification Proceedings of the 23rd International Conference on Distributed Computing Systems
  117. Aljifri H (2003). IP Traceback, IEEE Security and Privacy, 1:3, (24-31), Online publication date: 1-May-2003.
  118. ACM
    Mahajan R, Bellovin S, Floyd S, Ioannidis J, Paxson V and Shenker S (2002). Controlling high bandwidth aggregates in the network, ACM SIGCOMM Computer Communication Review, 32:3, (62-73), Online publication date: 1-Jul-2002.
  119. Buchholz F and Shields C Providing Process Origin Information to Aid in Network Traceback Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference, (261-274)
  120. ACM
    Brustoloni J Protecting electronic commerce from distributed denial-of-service attacks Proceedings of the 11th international conference on World Wide Web, (553-561)
  121. ACM
    Peuhkuri M A method to compress and anonymize packet traces Proceedings of the 1st ACM SIGCOMM Workshop on Internet measurement, (257-261)
  122. ACM
    Park K and Lee H (2001). On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets, ACM SIGCOMM Computer Communication Review, 31:4, (15-26), Online publication date: 1-Oct-2001.
  123. ACM
    Park K and Lee H On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, (15-26)
  124. Gil T and Poletto M MULTOPS Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
  125. Moore D, Voelker G and Savage S Inferring internet denial-of-service activity Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
  126. ACM
    Paxson V (2001). An analysis of using reflectors for distributed denial-of-service attacks, ACM SIGCOMM Computer Communication Review, 31:3, (38-47), Online publication date: 1-Jul-2001.
  127. Savage S, Wetherall D, Karlin A and Anderson T (2001). Network support for IP traceback, IEEE/ACM Transactions on Networking, 9:3, (226-237), Online publication date: 1-Jun-2001.
Contributors

Recommendations