The Community for Technology Leaders
RSS Icon
Issue No.02 - March/April (2002 vol.6)
pp: 20-26
<p>Using an IP traceback architecture in which routers store data about packets and adjacent forwarding nodes, we can trace IP packets to their source, even when the source IP address is forged.</p>
Tatsuya Baba, Shigeyuki Matsuda, "Tracing Network Attacks to Their Sources", IEEE Internet Computing, vol.6, no. 2, pp. 20-26, March/April 2002, doi:10.1109/4236.991439
8 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool