This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Tracing Network Attacks to Their Sources
March/April 2002 (vol. 6 no. 2)
pp. 20-26

Using an IP traceback architecture in which routers store data about packets and adjacent forwarding nodes, we can trace IP packets to their source, even when the source IP address is forged.

Citation:
Tatsuya Baba, Shigeyuki Matsuda, "Tracing Network Attacks to Their Sources," IEEE Internet Computing, vol. 6, no. 2, pp. 20-26, March-April 2002, doi:10.1109/4236.991439
Usage of this product signifies your acceptance of the Terms of Use.