More and more serious network attack makes it more impending to find out the source of attacker. In thispaper,we analyze the status in development of methods such as ICMP traceback, marking packet, hop by hop, IPsecau...More and more serious network attack makes it more impending to find out the source of attacker. In thispaper,we analyze the status in development of methods such as ICMP traceback, marking packet, hop by hop, IPsecauthentication and connection chain. We also put forward the tendency of marked IP traceback.展开更多
IP traceback technology is an important means combating Denial of Service (DoS) attacks in the Internet.Based on Deterministic Packet Marking and Probabilistic Packet Marking, this paper proposes a new IP tracebacksch...IP traceback technology is an important means combating Denial of Service (DoS) attacks in the Internet.Based on Deterministic Packet Marking and Probabilistic Packet Marking, this paper proposes a new IP tracebackscheme which is both efficient and robust against mark field spoofing.展开更多
文摘More and more serious network attack makes it more impending to find out the source of attacker. In thispaper,we analyze the status in development of methods such as ICMP traceback, marking packet, hop by hop, IPsecauthentication and connection chain. We also put forward the tendency of marked IP traceback.
文摘IP traceback technology is an important means combating Denial of Service (DoS) attacks in the Internet.Based on Deterministic Packet Marking and Probabilistic Packet Marking, this paper proposes a new IP tracebackscheme which is both efficient and robust against mark field spoofing.