Full metadata record
DC FieldValueLanguage
dc.contributor.authorYang, Ming Houren_US
dc.contributor.authorChiu, Chien-Sien_US
dc.contributor.authorShieh, Shiuhpyngen_US
dc.date.accessioned2017-04-21T06:49:34Z-
dc.date.available2017-04-21T06:49:34Z-
dc.date.issued2008en_US
dc.identifier.isbn978-1-4244-4238-6en_US
dc.identifier.urihttp://dx.doi.org/10.1109/ICIW.2008.50en_US
dc.identifier.urihttp://hdl.handle.net/11536/135026-
dc.description.abstractIn a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target\'s computing resource. To detect DDoS attacks in a network environment, IP traceback methods are deployed to determine the origin of attacking packets. With the increase in bandwidth of wireless networks, attackers may choose this medium from which to launch attacks. However, tracing the attackers in wireless networks is more difficult since intermediate nodes may move or attackers may change their location to hide themselves. Thus, conventional traceback schemes for wired networks cannot apply directly to the wireless network infrastructure because the intermediate routers could be compromised by an adversary. Therefore, we propose a flexible and lightweight traceback scheme to determine the source of attacking packets in a mobile ad-hoc environment. We will demonstrate our method\'s ability to track the movement of an attacker and recognize attack traffic launched by the same attacker from different locations.en_US
dc.language.isoen_USen_US
dc.titleTracing Mobile Attackers in Wireless Ad-Hoc Networken_US
dc.typeProceedings Paperen_US
dc.identifier.doi10.1109/ICIW.2008.50en_US
dc.identifier.journal2008 3RD INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2008)en_US
dc.citation.spage7en_US
dc.citation.epage+en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000290504500002en_US
dc.citation.woscount0en_US
Appears in Collections:Conferences Paper