Study of IP Traceback Application

碩士 === 樹德科技大學 === 資訊管理研究所 === 97 === Network has been the one the most of useful technology in the modern world. IP (IP Address) is the only identity in the network form TCP/IP Protocol. Nowadays, ISP use Dynamic Host Configuration Protocol for deliver IPv4’s IP address. In another word, every user...

Full description

Bibliographic Details
Main Authors: Chen-Kuang Lee, 李政廣
Other Authors: Chih-Hung Li
Format: Others
Language:zh-TW
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/49255452183496591884
id ndltd-TW-096STU00396011
record_format oai_dc
spelling ndltd-TW-096STU003960112015-10-13T14:53:17Z http://ndltd.ncl.edu.tw/handle/49255452183496591884 Study of IP Traceback Application 網路攻擊來源追蹤技術應用之研究 Chen-Kuang Lee 李政廣 碩士 樹德科技大學 資訊管理研究所 97 Network has been the one the most of useful technology in the modern world. IP (IP Address) is the only identity in the network form TCP/IP Protocol. Nowadays, ISP use Dynamic Host Configuration Protocol for deliver IPv4’s IP address. In another word, every user may be able to use the same IP address at the different time. Therefore any one can keep their identity hidden. However, this way can grow more and more attack behavior by using dynamic IP address. The attack such as worm, virus and DDoS (Distributed Denial of Service) are familiar in the network environment. Even though, there is a lot of ways to defense the attack behavior, but has less way can find the attack source and block it. Also, IP address isn’t a good clue to identify the attack source. This research brings up a integration way that can identify the source, compared to the old which that only defense the attacker. This research use IP Traceback tools, include Link Tasking, ICMP...ect, to build a system, not only identify the attacker by IP address but also to collect more clues for finding the location of attacker. Chih-Hung Li 李志宏 2009 學位論文 ; thesis 76 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 樹德科技大學 === 資訊管理研究所 === 97 === Network has been the one the most of useful technology in the modern world. IP (IP Address) is the only identity in the network form TCP/IP Protocol. Nowadays, ISP use Dynamic Host Configuration Protocol for deliver IPv4’s IP address. In another word, every user may be able to use the same IP address at the different time. Therefore any one can keep their identity hidden. However, this way can grow more and more attack behavior by using dynamic IP address. The attack such as worm, virus and DDoS (Distributed Denial of Service) are familiar in the network environment. Even though, there is a lot of ways to defense the attack behavior, but has less way can find the attack source and block it. Also, IP address isn’t a good clue to identify the attack source. This research brings up a integration way that can identify the source, compared to the old which that only defense the attacker. This research use IP Traceback tools, include Link Tasking, ICMP...ect, to build a system, not only identify the attacker by IP address but also to collect more clues for finding the location of attacker.
author2 Chih-Hung Li
author_facet Chih-Hung Li
Chen-Kuang Lee
李政廣
author Chen-Kuang Lee
李政廣
spellingShingle Chen-Kuang Lee
李政廣
Study of IP Traceback Application
author_sort Chen-Kuang Lee
title Study of IP Traceback Application
title_short Study of IP Traceback Application
title_full Study of IP Traceback Application
title_fullStr Study of IP Traceback Application
title_full_unstemmed Study of IP Traceback Application
title_sort study of ip traceback application
publishDate 2009
url http://ndltd.ncl.edu.tw/handle/49255452183496591884
work_keys_str_mv AT chenkuanglee studyofiptracebackapplication
AT lǐzhèngguǎng studyofiptracebackapplication
AT chenkuanglee wǎnglùgōngjīláiyuánzhuīzōngjìshùyīngyòngzhīyánjiū
AT lǐzhèngguǎng wǎnglùgōngjīláiyuánzhuīzōngjìshùyīngyòngzhīyánjiū
_version_ 1717760507168948224