Research Article
A Low-Overhead and High-Precision Attack Traceback Scheme with Combination Bloom Filters
Table 1
Comprehensive comparative analysis of attack traceback techniques.
| Category | Typical technologies | Storage overhead | Computing overhead | ISP cooperation | False positive ratio | False negative ratio | Traceback time |
| Link testing | Ingress filtering | Low | Low | Collaborative | High | Low | Long | Logging-based schemes | SPIE | High | Low | Collaborative | Low | Low | Middle | Packet marking methods | PPM | Low | High | Noncollaborative | High | Low | Long | ICMP-based technologies | iTrace | Low | Low | Collaborative | High | High | Long | Overlay network for IP traceback | CenterTrack | High | Low | Collaborative | Low | Low | Short | Compounded IP traceback | HPSIPT | Low | Low | Collaborative | Low | Low | Middle | SDN-based logging traceability techniques | SDN traceroute | High | Low | Collaborative | Middle | Middle | Middle | SDN-based logging traceability techniques | SDN selective logging method | Middle | Low | Collaborative | Middle | Middle | Middle | SDN-based traceability techniques | SMITE | Low | Middle | Collaborative | Low | Middle | Middle | SD-WAN scenarios traceback schemes | Cross-domain traceback scheme | Low | Middle | Collaborative | Low | Low | Middle |
|
|