2013
DOI: 10.4028/www.scientific.net/amm.347-350.3644
|View full text |Cite
|
Sign up to set email alerts
|

Research on Attack Source Traceback

Abstract: The existing methods of attack traceback still have many defects, such as input debugging method requires the professional intervention; ICMP traceback message takes up the network bandwidth resources and so on, so a new collaborative network is picked up, based on ant source of ideological attack tracking method. This method is mainly used strategy from ICMP traceback message, that is, data packet attacked is backed-up on the network monitor, and then the scope of the query path information is reduced using t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 2 publications
(2 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?