IP Traceback Method Base on Exploiting Modification Direction

碩士 === 國立虎尾科技大學 === 光電與材料科技研究所 === 99 === Because of THE TCP/IP''s defects, the attackers can counterfeits the source of the packet to do attacks. In order to prevent the attacks, we have to establish THE IP TRACKING TECHNIQUES to find out the real source of the attackers. Therefor...

Full description

Bibliographic Details
Main Authors: Yi-Lin Chen, 陳逸霖
Other Authors: 郭文中
Format: Others
Language:zh-TW
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/c25cc6
Description
Summary:碩士 === 國立虎尾科技大學 === 光電與材料科技研究所 === 99 === Because of THE TCP/IP''s defects, the attackers can counterfeits the source of the packet to do attacks. In order to prevent the attacks, we have to establish THE IP TRACKING TECHNIQUES to find out the real source of the attackers. Therefore, the way we do in the thesis is to use Gong''s Ways as the foundation and simultaneously combine the packet marketing with the packet logging to improve the drawbacks of that every packets that pass through the router should be recorded. Meanwhile, we can reduce the drawbacks that are resulted from constructing. The Attack Way by recording the information those pass through the router. We found that the way we do in the thesis is the single-packet IP tracking way which has lower wrong attack-nodes and storage expenditures.