Abstract

IP traceback can be used to confirm locations of attackers, stop on-going attacks, and take legal actions against attackers, and then impede attackers. This paper describes the background where IP traceback problem generates, and presents what the functions of IP traceback are. Furthermore, this paper classifies existing IP traceback methods and analyzes advantages and disadvantages of each method. In addition, future researches on IP traceback are proposed. This paper is of valuable reference for network researchers and engineers to be engaged in the further study on IP traceback.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call