Enhancement of Forensic ICMP Traceback Investigations through Embedded MIB Module Techniques

碩士 === 國立中正大學 === 通訊工程學系 === 98 === A DoS/DDoS attack may quickly exhaust the resources along the attacking path. Due to stepping stone and masquerade techniques (such as IP or MAC spoof) usually used in DoS/DDoS attacks, the intrusion traceback to the true attack originator becomes a challenging ta...

Full description

Bibliographic Details
Main Authors: Ching-kai Lin, 林敬凱
Other Authors: Bo-Chao Cheng
Format: Others
Language:zh-TW
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/52677145602068501536