The Deployment of Traceback Systems
In a computer network, intruders or attackers intended to attack with spoofed IP addresses. For the purpose of hiding their identity (Using proxy). IP Traceback is an effective solution for identifying source packets in order to reach the attacker by reconstructing the attacked path. For...