scispace - formally typeset
T

Tao Peng

Researcher at University of Melbourne

Publications -  15
Citations -  1600

Tao Peng is an academic researcher from University of Melbourne. The author has contributed to research in topics: Denial-of-service attack & Network packet. The author has an hindex of 11, co-authored 14 publications receiving 1549 citations.

Papers
More filters
Journal ArticleDOI

Survey of network-based defense mechanisms countering the DoS and DDoS problems

TL;DR: This survey analyzes the design decisions in the Internet that have created the potential for denial of service attacks and the methods that have been proposed for defense against these attacks, and discusses potential countermeasures against each defense mechanism.
Proceedings ArticleDOI

Protection from distributed denial of service attacks using history-based IP filtering

TL;DR: This paper introduces a practical scheme to defend against distributed denial of service (DDoS) attacks based on IP source address filtering, and presents several heuristic methods to make the IP address database accurate and robust.
Book ChapterDOI

Proactively detecting distributed denial of service attacks using source IP address monitoring

TL;DR: Wang et al. as mentioned in this paper proposed a simple but robust scheme to detect denial of service attacks by monitoring the increase of new IP addresses, which makes it hard for the attacker to counter this detection scheme by changing their attack signature.
Book ChapterDOI

Adjusted Probabilistic Packet Marking for IP Traceback

TL;DR: This paper presents a packet marking algorithm which allows the victim to traceback the approximate origin of spoofed IP packets, and develops three techniques to adjust the packet marking probability, which significantly reduces the number of packets needed by the Victim to reconstruct the attack path.
Patent

System and process for detecting anomalous network traffic

TL;DR: In this article, the authors propose a process for detecting anomalous network traffic in a communications network, the process including: generating reference address distribution data representing a statistical distribution of source addresses of packets received over a first time period, the received packets being considered to represent normal network traffic, and determining whether the packet received over the second time period represent normal packet traffic on the basis of a comparison of the second distribution data and the reference distribution data.