Study of IP Traceback Application

碩士 === 樹德科技大學 === 資訊管理研究所 === 97 === Network has been the one the most of useful technology in the modern world. IP (IP Address) is the only identity in the network form TCP/IP Protocol. Nowadays, ISP use Dynamic Host Configuration Protocol for deliver IPv4’s IP address. In another word, every user...

Full description

Bibliographic Details
Main Authors: Chen-Kuang Lee, 李政廣
Other Authors: Chih-Hung Li
Format: Others
Language:zh-TW
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/49255452183496591884
Description
Summary:碩士 === 樹德科技大學 === 資訊管理研究所 === 97 === Network has been the one the most of useful technology in the modern world. IP (IP Address) is the only identity in the network form TCP/IP Protocol. Nowadays, ISP use Dynamic Host Configuration Protocol for deliver IPv4’s IP address. In another word, every user may be able to use the same IP address at the different time. Therefore any one can keep their identity hidden. However, this way can grow more and more attack behavior by using dynamic IP address. The attack such as worm, virus and DDoS (Distributed Denial of Service) are familiar in the network environment. Even though, there is a lot of ways to defense the attack behavior, but has less way can find the attack source and block it. Also, IP address isn’t a good clue to identify the attack source. This research brings up a integration way that can identify the source, compared to the old which that only defense the attacker. This research use IP Traceback tools, include Link Tasking, ICMP...ect, to build a system, not only identify the attacker by IP address but also to collect more clues for finding the location of attacker.