Enhancement of Forensic ICMP Traceback Investigations through Embedded MIB Module Techniques
碩士 === 國立中正大學 === 通訊工程學系 === 98 === A DoS/DDoS attack may quickly exhaust the resources along the attacking path. Due to stepping stone and masquerade techniques (such as IP or MAC spoof) usually used in DoS/DDoS attacks, the intrusion traceback to the true attack originator becomes a challenging ta...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/52677145602068501536 |