Issue No. 02 - March/April (2002 vol. 6)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/4236.991439
<p>Using an IP traceback architecture in which routers store data about packets and adjacent forwarding nodes, we can trace IP packets to their source, even when the source IP address is forged.</p>
T. Baba and S. Matsuda, "Tracing Network Attacks to Their Sources," in IEEE Internet Computing, vol. 6, no. , pp. 20-26, 2002.