ML p(r)ior | A Concise Network-Centric Survey of IP Traceback Schemes based on Probabilistic Packet Marking

A Concise Network-Centric Survey of IP Traceback Schemes based on Probabilistic Packet Marking

2016-01-29
Multiple probabilistic packet marking (PPM) schemes for IP traceback have been proposed to deal with Distributed Denial of Service (DDoS) attacks by reconstructing their attack graphs and identifying the attack sources. In this paper, ten PPM-based IP traceback schemes are compared and analyzed in terms of features such as convergence time, performance evaluation, underlying topologies, incremental deployment, re-marking, and upstream graph. Our analysis shows that the considered schemes exhibit a significant discrepancy in performance as well as performance assessment. We concisely demonstrate this by providing a table showing that (a) different metrics are used for many schemes to measure their performance and, (b) most schemes are evaluated on different classes of underlying network topologies. Our results reveal that both the value and arrangement of the PPM-based scheme convergence times vary depending on exactly the underlying network topology. As a result, this paper shows that a side-by-side comparison of the scheme performance a complicated and turns out to be a crucial open problem in this research area.
PDF

Highlights - Most important sentences from the article

Login to like/save this paper, take notes and configure your recommendations

Related Articles

2019-01-07

This paper is concerned with the problem of broadcasting information from a source node to every nod… show more
PDF

Highlights - Most important sentences from the article

2019-03-20

Network reliability measures the probability that a target node is reachable from a source node in a… show more
PDF

Highlights - Most important sentences from the article

2018-10-19
1810.08498 | cs.SI

Data-driven analysis of complex networks has been in the focus of research for decades. An important… show more
PDF

Highlights - Most important sentences from the article

2017-10-10

Herein, we consider the problem of cooperative multi-access in the presence of overlapped coverage a… show more
PDF

Highlights - Most important sentences from the article

2018-06-07
1806.02628 | eess.SP

With the growing use of underwater acoustic communications (UWAC) for both industrial and military o… show more
PDF

Highlights - Most important sentences from the article

2017-11-18

The control problem of a linear discrete-time dynamical system over a multi-hop network is explored.… show more
PDF

Highlights - Most important sentences from the article

2015-12-23

The interconnection network comprises a significant portion of the cost of large parallel computers,… show more
PDF

Highlights - Most important sentences from the article

2016-05-05

Data centers are becoming increasingly popular for their flexibility and processing capabilities in … show more
PDF

Highlights - Most important sentences from the article

2013-08-12

When different type of packets with different needs of Quality of Service (QoS) requirements share t… show more
PDF

Highlights - Most important sentences from the article

2014-08-06
1408.1276 | cs.CR

We present a generic and automated approach to re-identifying nodes in anonymized social networks wh… show more
PDF

Highlights - Most important sentences from the article

2013-08-13

The network inference problem consists of reconstructing the edge set of a network given traces repr… show more
PDF

Highlights - Most important sentences from the article

2017-11-29

Centrality rankings such as degree, closeness, betweenness, Katz, PageRank, etc. are commonly used t… show more
PDF

Highlights - Most important sentences from the article

2015-01-17

Analysis of Internet topologies has shown that the Internet topology has negative curvature, measure… show more
PDF

Highlights - Most important sentences from the article

2013-05-20
1305.4548 | math.OC

A protocol for distributed estimation of discrete distributions is proposed. Each agent begins with … show more
PDF

Highlights - Most important sentences from the article

2013-03-07

The problem of assigning centrality values to nodes and edges in graphs has been widely investigated… show more
PDF

Highlights - Most important sentences from the article

2016-04-03
1604.00590 | cs.SI

Preferential attachment models have been widely studied in complex networks, because they can explai… show more
PDF

Highlights - Most important sentences from the article