Anycast-based spoofed traffic detection and mitigation

user-5f8411ab4c775e9685ff56d3(2018)

引用 0|浏览6
暂无评分
摘要
Systems and methods for detecting spoofed traffic include determining a first hop count of a first data query from a first transmitting device to a first server, determining a second hop count of a second data query from the first transmitting device to a second server, determining a third hop count of a third data query appearing to be from the first transmitting device to the first server, and determining a fourth hop count of a fourth data query appearing to be from the first transmitting device to the second server. The third and fourth hop counts are compared to the first and second hop counts, respectively. It is determined whether the third hop count differs from the first hop count by more than a predetermined amount.
更多
查看译文
关键词
Hop (networking),Anycast,Computer network,Spoofing attack,Computer science,Data query
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要