- Noah Davids. 2018. default TTL values. http://noahdavids.org/self_published/TTL_values.html. (2018).Google Scholar
- Cheng-Hung He and et al. 2018. A Zero Flow Entry Expiration Timeout P4 Switch. In SOSR. ACM, 19. Google ScholarDigital Library
- Cheng Jin and et al. 2003. Hop-count filtering: an effective defense against spoofed DDoS traffic. In CCS. ACM, 30--41. Google ScholarDigital Library
- Barefoot Networks. 2018. Tofino. https://barefootnetworks.com/products/brief-tofino/. (2018).Google Scholar
- Haining Wang, Cheng Jin, and Kang G Shin. 2007. Defense against spoofed IP traffic using hop-count filtering. ToN 15, 1 (2007), 40--53. Google ScholarDigital Library
Index Terms
- Filtering Spoofed IP Traffic Using Switching ASICs
Recommendations
Defense against spoofed IP traffic using hop-count filtering
IP spoofing has often been exploited by Distributed Denial of Service (DDoS) attacks to: 1) conceal flooding sources and dilute localities in flooding traffic, and 2) coax legitimate hosts into becoming reflectors, redirecting and amplifying flooding ...
Analysis of Spoofed IP Traffic Using Time-to-Live and Identification Fields in IP Headers
WAINA '11: Proceedings of the 2011 IEEE Workshops of International Conference on Advanced Information Networking and ApplicationsInternet services are often exposed to many kinds of threats such as the distributed denial of service (DDoS), viruses, and worms. Since these threats cause an adverse effect on the social and economical activities on the Internet, the technologies for ...
Throttling spoofed SYN flooding traffic at the source
TCP-based flooding attacks are a common form of Distributed Denial-of-Service (DDoS) attacks which abuse network resources and can bring about serious threats to the Internet. Incorporating IP spoofing makes it even more difficult to defend against such ...
Comments