Tracing Network Attacks to Their Sources

  • Authors:
  • Tatsuya Baba;Shigeyuki Matsuda

  • Affiliations:
  • -;-

  • Venue:
  • IEEE Internet Computing
  • Year:
  • 2002

Quantified Score

Hi-index 0.01

Visualization

Abstract

Using an IP traceback architecture in which routers store data about packets and adjacent forwarding nodes, we can trace IP packets to their source, even when the source IP address is forged.