IP Traceback Method Base on Exploiting Modification Direction

碩士 === 國立虎尾科技大學 === 光電與材料科技研究所 === 99 === Because of THE TCP/IP''s defects, the attackers can counterfeits the source of the packet to do attacks. In order to prevent the attacks, we have to establish THE IP TRACKING TECHNIQUES to find out the real source of the attackers. Therefor...

Full description

Bibliographic Details
Main Authors: Yi-Lin Chen, 陳逸霖
Other Authors: 郭文中
Format: Others
Language:zh-TW
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/c25cc6