Pi: a path identification mechanism to defend against DDoS attacks
Citations
1,153 citations
854 citations
Cites background from "Pi: a path identification mechanism..."
...performance, such as distributed traffic flooding and worm propagation attacks on the Internet [47–49]....
[...]
619 citations
522 citations
Cites background from "Pi: a path identification mechanism..."
...Based on IP traceback marking, Path Identifier (Pi) [45] embeds a path fingerprint in each packet so that a victim can identify all packets traversing the same path across the Internet, even for those with spoofed IP addresses....
[...]
...As a proactive solution to DDoS attacks, these filtering schemes [15, 25, 31, 45], which must execute on IP routers or rely on routers’ markings, have been proposed to prevent spoofed IP packets from reaching intended victims....
[...]
409 citations
Cites background from "Pi: a path identification mechanism..."
...3) Host and Router Based Solutions: Stack Path identifier (Pi) [130] is a reactive scheme, where each router uses IP identification field for marking....
[...]
References
3,514 citations
"Pi: a path identification mechanism..." refers methods in this paper
...A Fan-In Topology. the n least significant bits of the MD5 hash and ‘||’ represents concatenation....
[...]
...By modifying the markingbits function to return the MD5 [26] cryptographic hash of the IP address, we achieve a nearlyuniform distribution of the last bits of the hash....
[...]
...In an actual router implementation of Pi, the router computes the MD5 hash only once and not on a per-packet basis....
[...]
1,596 citations
"Pi: a path identification mechanism..." refers background in this paper
...Ferguson and Senie propose to deploy network ingress filtering to limit spoofing of the source IP address [13]....
[...]
1,444 citations
1,416 citations
"Pi: a path identification mechanism..." refers background in this paper
...Researchers often propose computational solutions for this class of attacks [10, 12, 17]....
[...]