Design and Implementation of FDPM in Network Processor
Notorious Distributed Denial of Service (DDoS) attacks consume a remote host or network resource to deny or degrade service to legitimate users. They have been identified as serious problems currently. Many mechanisms have been proposed to defend against DDoS attacks. IP traceback is a very important technology in these mechanisms. It provides the security system with the ability to identify the true source of the attacking IP packets. Flexible Deterministic Packet Marking (FDPM) is one of the IP traceback approaches. It only needs moderately a small number of packets to complete the IP traceback process. The implementation of FDPM in network processor demonstrates that FDPM is a good traceback method and the network processor can defend effectively against DDoS attacks.
FDPM network processor IP traceback packet marking DDoS
Kun Zeng Zhongwen Li Shan He
Kan Tah Kee College , Xiamen University ,Xiamen, China College of information science and technology, Chengdu Univisity,Chendu,China College of computer science and technology, China West Normal University, Nan Chong, China
国际会议
厦门
英文
135-138
2011-06-24(万方平台首次上网日期,不代表论文的发表时间)