More and more serious network attack makes it more impending to find out the source of attacker. In thispaper,we analyze the status in development of methods such as ICMP traceback, marking packet, hop by hop, IPsecau...More and more serious network attack makes it more impending to find out the source of attacker. In thispaper,we analyze the status in development of methods such as ICMP traceback, marking packet, hop by hop, IPsecauthentication and connection chain. We also put forward the tendency of marked IP traceback.展开更多
文摘More and more serious network attack makes it more impending to find out the source of attacker. In thispaper,we analyze the status in development of methods such as ICMP traceback, marking packet, hop by hop, IPsecauthentication and connection chain. We also put forward the tendency of marked IP traceback.