Abstract
Tracing back an anonymous hacker in the internet has been very hard to accomplish mainly due to the complexity of the internet and the lack of any deployed technology targeting this goal. In this paper, we introduce the most prominent research work done in the area of traceback. The traceback problem could be separated into IP traceback, traceback across stepping stones and worm traceback.
Original language | English (US) |
---|---|
Pages (from-to) | 54-61 |
Number of pages | 8 |
Journal | International Journal of Security and Networks |
Volume | 1 |
Issue number | 1-2 |
DOIs | |
State | Published - 2006 |
All Science Journal Classification (ASJC) codes
- Safety, Risk, Reliability and Quality
- Computer Networks and Communications
- Electrical and Electronic Engineering