Abstract
IP traceback can be used to confirm locations of attackers, stop on-going attacks, and take legal actions against attackers, and then impede attackers. This paper describes the background where IP traceback problem generates, and presents what the functions of IP traceback are. Furthermore, this paper classifies existing IP traceback methods and analyzes advantages and disadvantages of each method. In addition, future researches on IP traceback are proposed. This paper is of valuable reference for network researchers and engineers to be engaged in the further study on IP traceback.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have