Login / Signup

A Proposal for Cyber-Attack Trace-Back Using Packet Marking and Logging.

Pengfei LiYaokai FengJunpei KawamotoKouichi Sakurai
Published in: IMIS (2016)
Keyphrases
  • cyber attacks
  • cyber security
  • cyber defense
  • attack detection
  • security policies
  • intrusion detection system
  • countermeasures
  • critical infrastructure
  • intrusion detection
  • dos attacks
  • security mechanisms
  • privacy issues