Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices

With the advent of the Internet of Things (IoT), there are also major information security risks hidden behind them. There are major information security risks hidden behind them. Attackers can conceal their actual attack locations by spoofing IP addresses to attack IoT devices, law enforcement cann...

Full description

Bibliographic Details
Main Authors: Ming-Hour Yang, Jia-Ning Luo, M. Vijayalakshmi, S. Mercy Shalinie
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9240996/