IP Traceback Method Base on Exploiting Modification Direction
碩士 === 國立虎尾科技大學 === 光電與材料科技研究所 === 99 === Because of THE TCP/IP''s defects, the attackers can counterfeits the source of the packet to do attacks. In order to prevent the attacks, we have to establish THE IP TRACKING TECHNIQUES to find out the real source of the attackers. Therefor...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/c25cc6 |
Summary: | 碩士 === 國立虎尾科技大學 === 光電與材料科技研究所 === 99 === Because of THE TCP/IP''s defects, the attackers can counterfeits the source of the packet to do attacks. In order to prevent the attacks, we have to establish THE IP TRACKING TECHNIQUES to find out the real source of the attackers. Therefore, the way we do in the thesis is to use Gong''s Ways as the foundation and simultaneously combine the packet marketing with the packet logging to improve the drawbacks of that every packets that pass through the router should be recorded. Meanwhile, we can reduce the drawbacks that are resulted from constructing. The Attack Way by recording the information those pass through the router. We found that the way we do in the thesis is the single-packet IP tracking way which has lower wrong attack-nodes and storage expenditures.
|
---|