The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March/April (2002 vol.6)
pp: 20-26
ABSTRACT
<p>Using an IP traceback architecture in which routers store data about packets and adjacent forwarding nodes, we can trace IP packets to their source, even when the source IP address is forged.</p>
CITATION
Tatsuya Baba, Shigeyuki Matsuda, "Tracing Network Attacks to Their Sources", IEEE Internet Computing, vol.6, no. 2, pp. 20-26, March/April 2002, doi:10.1109/4236.991439
19 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool