Academic Journals Database
Disseminating quality controlled scientific knowledge

Review of PPM, a Traceback Technique for Defending Against DDoS Attacks

Author(s): Satwinder Singh#1, Abhinav Bhandari

Journal: International Journal of Engineering Trends and Technology
ISSN 2231-5381

Volume: 4;
Issue: 6;
Start page: 2550;
Date: 2013;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: — DoS | DDoS | PPM | IP | Traceback .

Distributed denial-of-service (DDoS) is a swiftly growing problem. Denials of Service (DoS) attacks add up to one of the major fear and among the hardest security problems in today’s Internet. DDoS attacks are more difficult to handle because their traffic can be made highly similar to the legitimate traffic. With little or no advance notice, a DDoS attack can easily wear out the computing and communication resources of its victim within a short period of time. This paper presents classification of DDoS tools and IP Traceback technique to configure the actual source of attacker. The attack classification criteria were selected to highlight commonalities and important features of attack strategies. The goal of this paper is to place some order into the existing attack and defence mechanisms, so that a better thoughtful of DDoS attacks can be achieved and then more efficient and effective algorithms, techniques and procedures to fighting these attacks may be developed.

Tango Rapperswil
Tango Rapperswil

     Save time & money - Smart Internet Solutions