作者: Karanpreet Singh , Paramvir Singh , Krishan Kumar
DOI: 10.1016/J.COSE.2015.06.007
关键词:
摘要: Comprehensive categorization of the IP traceback schemes.In-depth evaluation approaches, classes and metrics.Exploration research trends with help a systematic review protocol.Discussion on mapping results literature review.Summarization issues, challenges future avenues. Internet has always been vulnerable to variety security threats as it was originally designed without apprehending prospect concerns. Modern era seen diverse nature attacks possible Internet, including most perilous attack, Distributed Denial Service (DDoS) attacks. In such an large number compromised systems coordinate each other so direct gigantic magnitude attack traffic toward victim, depleting its tangible intangible network resources. To further exacerbate situation, these usually disguise their identity by capitalizing address spoofing. is class techniques used identify actual source packets. this paper, we followed approach comprehensively categorize 275 works representing existing literature. The paper also provides in-depth analysis different functional metrics. Based review, answered set questions understand current in traceback. Various avenues for area are discussed.