Tracing Network Attacks to Their Sources

An IP traceback architecture in which routers log data about packets and adjacent forwarding nodes lets us trace IP packets to their sources, even when the source IP address is forged.

[1]  Paul Ferguson,et al.  Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.

[2]  Anna R. Karlin,et al.  Network support for IP traceback , 2001, TNET.

[3]  Steven M. Bellovin,et al.  ICMP Traceback Messages , 2003 .

[4]  M. Asaka,et al.  A method of tracing intruders by use of mobile agents , 1999 .

[5]  Anna R. Karlin,et al.  Practical network support for IP traceback , 2000, SIGCOMM.

[6]  Robert Stone,et al.  CenterTrack: An IP Overlay Network for Tracking DoS Floods , 2000, USENIX Security Symposium.

[7]  Shyhtsun Felix Wu,et al.  DECIDUOUS: decentralized source identification for network-based intrusions , 1999, Integrated Network Management VI. Distributed Management for the Networked Millennium. Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management. (Cat. No.99EX302).