Description
ABSTRACT
Because the Internet has been widely applied in various fields, more and more network security
issues emerge and catch people’s attention. However, adversaries often hide themselves by spoofing
their own IP addresses and then launch attacks. For this reason, researchers have proposed a lot of
traceback schemes to trace the source of these attacks. Some use only one packet in their packet
logging schemes to achieve IP tracking. Others combine packetmarking with packet logging and
therefore create hybrid IP traceback schemes demanding less storage but requiring a longer search
Only logged in customers who have purchased this product may leave a review.
Reviews
There are no reviews yet.