Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • chapterNo Access

    Tracing Single-Packet Attacks to Their Sources

    The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. attackers often use incorrect, or spoofed, source IP addresses. In this paper, We propose a new method for IP traceback that collects audit trails for traffic within the network, and can trace the origin of a single IP packet delivered by the network in the recent past. We demonstrate that the method is effective. We present both analytic and simulation results showing the method’s effectiveness by contrasting with SPIE[1] and Scheme J[2]. We believe that the key contribution of our method is to demonstrate that constructing attack graph is not necessary for tracing.