IP Traceback Method Base on Exploiting Modification Direction
碩士 === 國立虎尾科技大學 === 光電與材料科技研究所 === 99 === Because of THE TCP/IP''s defects, the attackers can counterfeits the source of the packet to do attacks. In order to prevent the attacks, we have to establish THE IP TRACKING TECHNIQUES to find out the real source of the attackers. Therefor...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/c25cc6 |